Django is a free and open-source, Python-based web framework that follows the model–template–views (MTV) architectural pattern. Django is maintained by the independent organization Django Software Foundation.
The latest releases of the framework, Django 4.0.6 and 3.2.14, addressed a high-severity SQL Injection vulnerability tracked as CVE-2022-34265.
According to the release note, the flaw resides in the Trunc() and Extract() database functions, it can be exploited if untrusted data was used as a kind/lookup_name value. Performing input sanitization for these functions it is possible to mitigate the risk of exploitation of the flaw.
“Trunc() and Extract() database functions were subject to SQL injection if untrusted data was used as a kind/lookup_name value.” reads the note. “Applications that constrain the lookup name and kind choice to a known safe list are unaffected.”
The development team also releases security patches as temporary solutions before upgrading to the latest versions.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, SQL Injection)
[adrotate banner=”5″]
[adrotate banner=”13″]