摘要:
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
安全等级: Low
公告ID: KylinSec-SA-2022-2072
发布日期: 2022年9月23日
关联CVE: CVE-2022-34265
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-34265 | KY3.4-4A | python-django | Unaffected |
CVE-2022-34265 | KY3.4-5A | python-django | Unaffected |
CVE-2022-34265 | KY3.5.1 | python-django | Unaffected |