Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Django 3.1 < 3.1.13, 3.2 < 3.2.5 SQLi Vulnerability - Windows

Information

Severity

Severity

Medium

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

5.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

2 years ago

Modified

Modified

2 years ago

Summary

Django is prone to an SQL injection (SQLi) vulnerability.

Insight

Insight

Unsanitized user input passed to QuerySet.order_by() could bypass intended column reference validation in path marked for deprecation resulting in a potential SQL injection even if a deprecation warning is emitted.

Affected Software

Affected Software

Django version 3.1 prior to 3.1.13 and 3.2 prior to 3.2.5

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 3.1.13, 3.2.5 or later.

Common Vulnerabilities and Exposures (CVE)