• 公告ID (KylinSec-SA-2022-2072)

摘要:

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

安全等级: Low

公告ID: KylinSec-SA-2022-2072

发布日期: 2022年9月23日

关联CVE: CVE-2022-34265  

  • 详细介绍

1. 漏洞描述

   

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-34265 KY3.4-4A python-django Unaffected
CVE-2022-34265 KY3.4-5A python-django Unaffected
CVE-2022-34265 KY3.5.1 python-django Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-2071 下一篇:KylinSec-SA-2022-2086