Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-35042 PoC — Django SQL注入漏洞

Source
Associated Vulnerability
Title:Django SQL注入漏洞 (CVE-2021-35042)
Description:Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
Description
Reproduce CVE-2021-35042
Readme
# CVE-2021-35042
SQL injection via QuerySet.order_by() untrusted input

# Setup:
Start the instances using: 
`docker-compose up`

Now open the following URL to load sample data:

http://localhost:8000/vul_app/setup

Then go to the vulnerable page at:
http://localhost:8000/vul_app/

Exploit the parameter at:
http://localhost:8000/vul_app/?order_by=name
File Snapshot

[4.0K] /data/pocs/cb6144a57e970dc8b044b502a6a82582abe321ac ├── [4.0K] cve202135042 │   ├── [ 417] asgi.py │   ├── [3.8K] settings.py │   ├── [ 859] urls.py │   └── [ 417] wsgi.py ├── [ 456] docker-compose.yml ├── [ 204] Dockerfile ├── [ 354] README.md ├── [ 37] requirements.txt ├── [ 185] setup.sh └── [4.0K] vul_app ├── [ 66] admin.py ├── [ 151] apps.py ├── [ 323] models.py ├── [4.0K] templates │   └── [ 838] home.html ├── [ 63] tests.py ├── [ 178] urls.py └── [ 683] views.py 3 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →