CVE-2022-34265 Django: Emulation and Detection
In this lab, you’ll practice attacking and defending against the CVE-2022-34265 (Django SQL injection) vulnerability. When you’re finished, you’ll have an understanding of how the exploit works, and how it can be detected.
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
Emulation
In this challenge, you will be provided with an environment containing a web application vulnerable to CVE-2022-34265. You will walk through the steps required to identify the SQL injection and build out a proof of concept to exploit the vulnerability.
Challenge
Detection
In this challenge, you will access and analyze the log files of the web application serving the application vulnerable to CVE-2022-34265. Due to the exploitation requirements of the vulnerability in the example lab environment, the SQL injection results in specific server response codes, which can be used to identify attempted and successful exploitation - and thereafter analyze the activities the attacker performed.
Challenge
Protection
In this challenge, the learner will examine and implement different mechanisms to protect against CVE-2022-34265. The formal and correct solution of upgrading the vulnerable software will be discussed, and an alternative method of using a web application firewall at the ingress edge will be demonstrated (which has defense in depth merits, for example in a large organization where patching is difficult, assets are unknown, or an immediate response to a new vulnerability is required).
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Understanding of SQL injection
- Use of a Linux operating system
- Accessing Docker containers