All vulnerabilities
CVE-2022-34265
Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection
Description
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
Patch Available
Fix available through Seal Security.
No upgrade required, protect your application instantly.
Fix without upgrading
Score
Severity
Ecosystem
Python
Publish Date
July 4, 2022
Modified Date
December 5, 2023
Score Vector
Affected Versions

