Описание
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
A flaw was found in Django. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value.
Отчет
Applications that constrain the lookup name and kind choice to a known safe list are unaffected. Red Hat Satellite 6 versions include affected versions of python-django, however, the product is not vulnerable since it does not make use of vulnerable functions. Future updates may fix this issue.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Ansible Automation Platform 1.2 | ansible-tower | Affected | ||
Red Hat Ansible Automation Platform 2 | automation-controller | Affected | ||
Red Hat Ansible Automation Platform 2 | python3-django | Affected | ||
Red Hat Ansible Automation Platform 2 | python-django | Affected | ||
Red Hat Ceph Storage 3 | python-django | Out of support scope | ||
Red Hat OpenStack Platform 13 (Queens) | python-django | Not affected | ||
Red Hat OpenStack Platform 16.1 | python-django20 | Not affected | ||
Red Hat OpenStack Platform 16.2 | python-django20 | Not affected | ||
Red Hat Satellite 6 | python3-django | Not affected | ||
Red Hat Satellite 6 | python-pulp-container | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0 ...
Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection
Уязвимость функции Trunc/Extract фреймворка для веб-разработки Django, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
EPSS
9.8 Critical
CVSS3