Django is a free and open-source, Python-based web framework that follows the model–template–views (MTV) architectural pattern. Django is maintained by the independent organization Django Software Foundation.
The latest releases of the framework, Django 4.0.6 and 3.2.14, addressed a high-severity SQL Injection vulnerability tracked as CVE-2022-34265.
According to the release note, the flaw resides in the Trunc() and Extract() database functions, it can be exploited if untrusted data was used as a kind/lookup_name value. Performing input sanitization for these functions it is possible to mitigate the risk of exploitation of the flaw.
“Trunc() and Extract() database functions were subject to SQL injection if untrusted data was used as a kind/lookup_name value.” reads the note. “Applications that constrain the lookup name and kind choice to a known safe list are unaffected.”
The development team also releases security patches as temporary solutions before upgrading to the latest versions.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, SQL Injection)
[adrotate banner=”5″]
[adrotate banner=”13″]
Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws across multiple products, including…
Fortinet fixed a critical remote code execution zero-day vulnerability actively exploited in attacks targeting FortiVoice…
Interlock Ransomware 's attack on a defense contractor exposed global defense supply chain details, risking…
Marks and Spencer (M&S) confirms that threat actors stole customer data in the ransomware attack…
A 45-year-old foreign man has been arrested in Moldova for allegedly participating in ransomware attacks…
A Türkiye-linked group used an Output Messenger zero-day to spy on Kurdish military targets in…
This website uses cookies.