Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-34265

Description

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

POC

Reference

No PoCs from references.

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/OSCKOREA-WORKSHOP/NEXUS-Firewall

- https://github.com/POC-2025/nuclei

- https://github.com/SYRTI/POC_to_review

- https://github.com/SurfRid3r/Django_vulnerability_analysis

- https://github.com/TakutoYoshikai/TakutoYoshikai

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/Vulhub-Reproduce

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/ZhaoQi99/CVE-2022-34265

- https://github.com/ZhaoQi99/ZhaoQi99

- https://github.com/aboutyouprv1337/Nuclei

- https://github.com/aeyesec/CVE-2022-34265

- https://github.com/amakhu/cdp

- https://github.com/bakery312/Vulhub-Reproduce

- https://github.com/binana354/nuclei

- https://github.com/byt3n33dl3/thc-Nuclei

- https://github.com/cihan-atas/cyberexam-rooms

- https://github.com/coco0x0a/CTF_Django_CVE-2022-34265

- https://github.com/dashmeet2023/Automated-Vulnerability-Checker

- https://github.com/dev-thefirewall/nuclei-test

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/kDv44/djangoApi-V4.0

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lnwza0x0a/CTF_Django_CVE-2022-34265

- https://github.com/manas3c/CVE-POC

- https://github.com/mitigatesh/nuclei

- https://github.com/niphon-sn/Vulnerability-Scanning-Tools

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/projectdiscovery/nuclei

- https://github.com/qwqoro/GPN-Hackathon

- https://github.com/retired54/Retired

- https://github.com/runZeroInc/nuclei

- https://github.com/seal-community/patches

- https://github.com/simonepetruzzi/WebSecurityProject

- https://github.com/snakesec/nuclei

- https://github.com/t0m4too/t0m4to

- https://github.com/test-org-appsec/nuclei

- https://github.com/testuser4040-coder/nuclei

- https://github.com/traumatising/CVE-2022-34265

- https://github.com/trhacknon/Pocingit

- https://github.com/user-v10137/Learning_log

- https://github.com/whoforget/CVE-POC

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yanggangbb/CVE-Docker

- https://github.com/yoryio/django-vuln-research

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve