E22-ekyh1
CVSS:
9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
2
Year:
2022
Description
This strike exploits two SQL injection vulnerability in Django. The vulnerabilities are due to insufficient sanitization of user input to kind and lookup_name parameter passed to database functions Trunc and Extract respectively.
A remote attacker can exploit the vulnerabilities by sending a crafted request to the target server. Successful exploitation could result in execution of arbitrary SQL statements.
*NOTE: When running this strike in OneArm mode, it sends a malicious request to the target Django webapp, and creates a new table in the database.