An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
References
Configurations
Configuration 1 (hide)
|
History
28 Apr 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Apr 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Oct 2022, 22:28
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5254 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20220818-0006/ - Third Party Advisory |
16 Oct 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Aug 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Jul 2022, 15:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
References | (CONFIRM) https://www.djangoproject.com/weblog/2022/jul/04/security-releases/ - Patch, Vendor Advisory | |
References | (MISC) https://docs.djangoproject.com/en/4.0/releases/security/ - Patch, Vendor Advisory | |
References | (MISC) https://groups.google.com/forum/#!forum/django-announce - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* |
04 Jul 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-07-04 16:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-34265
Mitre link : CVE-2022-34265
CVE.ORG link : CVE-2022-34265
JSON object : View
Products Affected
djangoproject
- django
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')