CVE-2022-34265

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:48

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/', 'name': 'FEDORA-2023-8fed428c5e', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://groups.google.com/forum/#!forum/django-announce', 'name': 'https://groups.google.com/forum/#!forum/django-announce', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/', 'name': 'FEDORA-2023-a53ab7c969', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/ -
  • () https://groups.google.com/forum/#%21forum/django-announce -

28 Apr 2023, 05:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/ -

28 Apr 2023, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/ -

26 Oct 2022, 22:28

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2022/dsa-5254 - (DEBIAN) https://www.debian.org/security/2022/dsa-5254 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220818-0006/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220818-0006/ - Third Party Advisory

16 Oct 2022, 00:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5254 -

18 Aug 2022, 15:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220818-0006/ -

13 Jul 2022, 15:39

Type Values Removed Values Added
CPE cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
CWE CWE-89
First Time Djangoproject django
Djangoproject
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (MISC) https://docs.djangoproject.com/en/4.0/releases/security/ - (MISC) https://docs.djangoproject.com/en/4.0/releases/security/ - Patch, Vendor Advisory
References (MISC) https://groups.google.com/forum/#!forum/django-announce - (MISC) https://groups.google.com/forum/#!forum/django-announce - Mailing List, Third Party Advisory
References (CONFIRM) https://www.djangoproject.com/weblog/2022/jul/04/security-releases/ - (CONFIRM) https://www.djangoproject.com/weblog/2022/jul/04/security-releases/ - Patch, Vendor Advisory

04 Jul 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-04 16:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-34265

Mitre link : CVE-2022-34265

CVE.ORG link : CVE-2022-34265


JSON object : View

Products Affected

djangoproject

  • django
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')