Published: 02/12/2019 Updated: 01/05/2020
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Vulnerability Summary

Django 2.1 prior to 2.1.15 and 2.2 prior to 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)

Vulnerability Trend

Affected Products

Vendor Product Versions
DjangoprojectDjango2.1, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.11, 2.1.12, 2.1.13, 2.1.14, 2.2, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7

Vendor Advisories

Debian Bug report logs - #946011 python-django: CVE-2019-19118 Package: python-django; Maintainer for python-django is Debian Python Modules Team <python-modules-team@listsaliothdebianorg>; Source for python-django is src:python-django (PTS, buildd, popcon) Reported by: "Chris Lamb" <lamby@debianorg> Date: Mon, ...
A privilege escalation issue has been found in Django since 21 and before 228 or 2115, where a user who lacks permission to edit a model should not be able to trigger its save-related signals ...

Mailing Lists

wwwdjangoprojectcom/weblog/2019/dec/02/security-releases/ <wwwdjangoprojectcom/weblog/2019/dec/02/security-releases/> In accordance with `our security release policy <docsdjangoprojectcom/en/dev/internals/security/>`_, the Django team is issuing `Django 228 <docsdjangoprojectcom/en/dev/rel ...

Github Repositories