diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2022-06-22 12:44:04 +0200 |
|---|---|---|
| committer | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2022-07-04 08:41:33 +0200 |
| commit | a9010fe5555e6086a9d9ae50069579400ef0685e (patch) | |
| tree | 9205cc581de9c817f3e1bbc9a19c2223816c69f7 /django/db/models/functions/datetime.py | |
| parent | 3acf156be371b968b398062c28fe7a9449745a70 (diff) | |
[3.2.x] Fixed CVE-2022-34265 -- Protected Trunc(kind)/Extract(lookup_name) against SQL injection.
Thanks Takuto Yoshikai (Aeye Security Lab) for the report.
Diffstat (limited to 'django/db/models/functions/datetime.py')
| -rw-r--r-- | django/db/models/functions/datetime.py | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/django/db/models/functions/datetime.py b/django/db/models/functions/datetime.py index 90e6f41be0..47651d281f 100644 --- a/django/db/models/functions/datetime.py +++ b/django/db/models/functions/datetime.py @@ -41,6 +41,8 @@ class Extract(TimezoneMixin, Transform): super().__init__(expression, **extra) def as_sql(self, compiler, connection): + if not connection.ops.extract_trunc_lookup_pattern.fullmatch(self.lookup_name): + raise ValueError("Invalid lookup_name: %s" % self.lookup_name) sql, params = compiler.compile(self.lhs) lhs_output_field = self.lhs.output_field if isinstance(lhs_output_field, DateTimeField): @@ -192,6 +194,8 @@ class TruncBase(TimezoneMixin, Transform): super().__init__(expression, output_field=output_field, **extra) def as_sql(self, compiler, connection): + if not connection.ops.extract_trunc_lookup_pattern.fullmatch(self.kind): + raise ValueError("Invalid kind: %s" % self.kind) inner_sql, inner_params = compiler.compile(self.lhs) tzname = None if isinstance(self.lhs.output_field, DateTimeField): |
