Popular Django web framework affected by a SQL Injection flaw. Upgrade it now!

The development team behind the Django Project has addressed a high-severity SQL Injection flaw in its framework.

Django is a free and open-source, Python-based web framework that follows the model–template–views (MTV) architectural pattern. Django is maintained by the independent organization Django Software Foundation.

The latest releases of the framework, Django 4.0.6 and 3.2.14, addressed a high-severity SQL Injection vulnerability tracked as CVE-2022-34265.

According to the release note, the flaw resides in the Trunc() and Extract() database functions, it can be exploited if untrusted data was used as a kind/lookup_name value. Performing input sanitization for these functions it is possible to mitigate the risk of exploitation of the flaw.

“Trunc() and Extract() database functions were subject to SQL injection if untrusted data was used as a kind/lookup_name value.” reads the note. “Applications that constrain the lookup name and kind choice to a known safe list are unaffected.”

The development team also releases security patches as temporary solutions before upgrading to the latest versions.

Follow me on Twitter: @securityaffairs and Facebook

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}
Pierluigi Paganini

(SecurityAffairs – hacking, SQL Injection)

The post Popular Django web framework affected by a SQL Injection flaw. Upgrade it now! appeared first on Security Affairs.