Reproduce CVE-2021-35042# CVE-2021-35042
SQL injection via QuerySet.order_by() untrusted input
# Setup:
Start the instances using:
`docker-compose up`
Now open the following URL to load sample data:
http://localhost:8000/vul_app/setup
Then go to the vulnerable page at:
http://localhost:8000/vul_app/
Exploit the parameter at:
http://localhost:8000/vul_app/?order_by=name
[4.0K] /data/pocs/cb6144a57e970dc8b044b502a6a82582abe321ac
├── [4.0K] cve202135042
│ ├── [ 417] asgi.py
│ ├── [3.8K] settings.py
│ ├── [ 859] urls.py
│ └── [ 417] wsgi.py
├── [ 456] docker-compose.yml
├── [ 204] Dockerfile
├── [ 354] README.md
├── [ 37] requirements.txt
├── [ 185] setup.sh
└── [4.0K] vul_app
├── [ 66] admin.py
├── [ 151] apps.py
├── [ 323] models.py
├── [4.0K] templates
│ └── [ 838] home.html
├── [ 63] tests.py
├── [ 178] urls.py
└── [ 683] views.py
3 directories, 16 files