All vulnerabilities

CVE-2022-34265

Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection

Description

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

Patch Available

Fix available through Seal Security. 

No upgrade required, protect your application instantly.

Fix without upgrading
Score
Severity
Ecosystem
Python
Publish Date
July 4, 2022
Modified Date
December 5, 2023
Score Vector
Affected Versions