
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-0704 was identified in Django, affecting the Trunc() and Extract() database functions. The vulnerability was disclosed on July 4, 2022, and impacted Django's main branch, Django 4.1 (beta), Django 4.0, and Django 3.2 versions (Django Advisory).
The vulnerability involves SQL injection potential through untrusted data used as kind/lookup_name values in Trunc() and Extract() database functions. The issue was rated as 'high' severity according to Django's security policy. Applications that constrain the lookup name and kind choice to a known safe list were not affected (Django Advisory).
If exploited, this vulnerability could allow attackers to perform SQL injection attacks through the Trunc() and Extract() database functions, potentially compromising database security and accessing unauthorized data (Django Advisory).
Django released security updates to address this vulnerability: Django 4.0.6 and Django 3.2.14. Users are strongly encouraged to upgrade to these patched versions. The Django team also identified improvements to the Database API methods related to date extract and truncate that would be beneficial to add to Django 4.1 (Django Advisory).
The vulnerability was discovered and reported by Takuto Yoshikai from Aeye Security Lab. The Django security team classified this as a 'high' severity issue according to their security policy (Django Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."