HTTP: Django Trunc And Extract SQL Injection

This signature detects attempts to exploit a known vulnerability against Django Trunc and Extract SQL Injection. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

Affected Products

Djangoproject django

Short Name
HTTP:SQL:INJ:DJNGO-TRUNC-SQLI
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
And CVE-2022-34265 Django Extract Injection SQL Trunc
Release Date
08/09/2022
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3516
False Positive
Unknown
Vendors

Djangoproject

CVSS Score

7.5

Found a potential security threat?