CVE-2022-34265
Summary
| CVE | CVE-2022-34265 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-07-04 16:15:00 UTC |
| Updated | 2023-11-07 03:48:00 UTC |
| Description | An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 181137 Debian Security Update for python-django (DSA 5254-1)
- 181172 Debian Security Update for python-django (DLA 3164-1)
- 184538 Debian Security Update for python-django (CVE-2022-34265)
- 198847 Ubuntu Security Notification for Django Vulnerability (USN-5501-1)
- 240925 Red Hat Update for Satellite 6.12 (RHSA-2022:8506)
- 283945 Fedora Security Update for python (FEDORA-2023-8fed428c5e)
- 284167 Fedora Security Update for python (FEDORA-2023-a53ab7c969)
- 296083 Oracle Solaris 11.4 Support Repository Update (SRU) 49.126.2 Missing (CPUOCT2022)
- 502440 Alpine Linux Security Update for py3-django
- 505305 Alpine Linux Security Update for py3-django
- 690891 Free Berkeley Software Distribution (FreeBSD) Security Update for django (5be19b0d-fb85-11ec-95cd-080027b24e86)
- 960485 Rocky Linux Security Update for Satellite (RLSA-2022:8506)