Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-34265

Опубликовано: 04 июл. 2022
Источник: debian
EPSS Критический

Описание

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed2:4.0.6-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2022/07/04/2

  • https://www.djangoproject.com/weblog/2022/jul/04/security-releases/

  • https://github.com/django/django/commit/54eb8a374d5d98594b264e8ec22337819b37443c (main)

  • https://github.com/django/django/commit/0dc9c016fadb71a067e5a42be30164e3f96c0492 (4.0.6)

  • https://github.com/django/django/commit/a9010fe5555e6086a9d9ae50069579400ef0685e (3.2.14)

EPSS

Процентиль: 100%
0.92734
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 3 лет назад

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
redhat
около 3 лет назад

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
nvd
около 3 лет назад

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVSS3: 9.8
github
около 3 лет назад

Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection

CVSS3: 6.3
fstec
больше 3 лет назад

Уязвимость функции Trunc/Extract фреймворка для веб-разработки Django, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 100%
0.92734
Критический