Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection
Critical severity
GitHub Reviewed
Published
Jul 5, 2022
to the GitHub Advisory Database
•
Updated Sep 20, 2024
Package
Affected versions
>= 3.2a1, < 3.2.14
>= 4.0a1, < 4.0.6
Patched versions
3.2.14
4.0.6
Description
Published by the National Vulnerability Database
Jul 4, 2022
Published to the GitHub Advisory Database
Jul 5, 2022
Reviewed
Jul 5, 2022
Last updated
Sep 20, 2024
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The
Trunc()
andExtract()
database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.References