summaryrefslogtreecommitdiff
path: root/django/db/models/sql
diff options
context:
space:
mode:
authorJake Howard <git@theorangeone.net>2025-08-13 14:13:42 +0200
committerSarah Boyce <42296566+sarahboyce@users.noreply.github.com>2025-09-03 13:39:26 +0200
commit31334e6965ad136a5e369993b01721499c5d1a92 (patch)
tree3a573a3b716089b6854e2c089c26b3ae1d9c28da /django/db/models/sql
parentd5860d55ebe3623e6c6f8d6c5a1cdb28ae4a7505 (diff)
[4.2.x] Fixed CVE-2025-57833 -- Protected FilteredRelation against SQL injection in column aliases.
Thanks Eyal Gabay (EyalSec) for the report. Backport of 51711717098d3f469f795dfa6bc3758b24f69ef7 from main.
Diffstat (limited to 'django/db/models/sql')
-rw-r--r--django/db/models/sql/query.py1
1 files changed, 1 insertions, 0 deletions
diff --git a/django/db/models/sql/query.py b/django/db/models/sql/query.py
index e68fd9efb7..5a1b68507b 100644
--- a/django/db/models/sql/query.py
+++ b/django/db/models/sql/query.py
@@ -1620,6 +1620,7 @@ class Query(BaseExpression):
return target_clause
def add_filtered_relation(self, filtered_relation, alias):
+ self.check_alias(alias)
filtered_relation.alias = alias
lookups = dict(get_children_from_q(filtered_relation.condition))
relation_lookup_parts, relation_field_parts, _ = self.solve_lookup_type(