Django Trunc and Extract SQL Injection

Strike ID:
E22-ekyh1
CVSS:
9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
2
Year:
2022

Description

This strike exploits two SQL injection vulnerability in Django. The vulnerabilities are due to insufficient sanitization of user input to kind and lookup_name parameter passed to database functions Trunc and Extract respectively. A remote attacker can exploit the vulnerabilities by sending a crafted request to the target server. Successful exploitation could result in execution of arbitrary SQL statements. *NOTE: When running this strike in OneArm mode, it sends a malicious request to the target Django webapp, and creates a new table in the database.

CVE

References