Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53908: n/a

0
Critical
VulnerabilityCVE-2024-53908cvecve-2024-53908
Published: Fri Dec 06 2024 (12/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-53908 is a critical SQL injection vulnerability affecting Django versions prior to 5. 1. 4, 5. 0. 10, and 4. 2. 17 when using the HasKey lookup on JSON fields with Oracle databases. The flaw arises from direct usage of django. db. models.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:48:29 UTC

Technical Analysis

CVE-2024-53908 is a severe SQL injection vulnerability identified in Django's handling of JSON field lookups specifically when interfacing with Oracle databases. The issue exists in Django versions before 5.1.4, 5.0.10, and 4.2.17. The vulnerability stems from the direct use of the django.db.models.fields.json.HasKey lookup, which, when supplied with untrusted input as the lhs value, fails to properly sanitize or parameterize the input. This improper handling allows an attacker to craft malicious input that can alter the intended SQL query, leading to SQL injection (CWE-89). Notably, applications that use the jsonfield.has_key lookup via the double underscore (__) syntax are not vulnerable, indicating the flaw is limited to direct usage of HasKey. The vulnerability is critical because it allows remote attackers to execute arbitrary SQL commands without authentication or user interaction, potentially compromising the entire database's confidentiality, integrity, and availability. The CVSS 3.1 score of 9.8 reflects the ease of exploitation and the severe impact. Although no known exploits have been reported in the wild yet, the vulnerability's nature and severity make it a high-priority risk for organizations using affected Django versions with Oracle backends. The issue was publicly disclosed on December 6, 2024, and patches have been released in Django 5.1.4, 5.0.10, and 4.2.17 to address the problem.

Potential Impact

The SQL injection vulnerability in Django's HasKey lookup on Oracle databases can have devastating impacts on organizations worldwide. Exploitation allows attackers to execute arbitrary SQL commands remotely without authentication, leading to full database compromise. This can result in unauthorized data disclosure, data modification or deletion, and potential disruption of application availability. Organizations relying on Django with Oracle backends for critical applications risk severe data breaches, loss of customer trust, regulatory penalties, and operational downtime. The vulnerability's ease of exploitation and high severity make it a prime target for attackers seeking to leverage SQL injection for lateral movement, data exfiltration, or ransomware deployment. Given Django's widespread use in web applications globally, especially in enterprise environments that may use Oracle databases, the impact is broad and significant.

Mitigation Recommendations

To mitigate CVE-2024-53908, organizations should immediately upgrade Django to versions 5.1.4, 5.0.10, or 4.2.17 or later, where the vulnerability is patched. Avoid direct usage of django.db.models.fields.json.HasKey lookup with untrusted input, especially when using Oracle databases. Instead, use the jsonfield.has_key lookup via the double underscore syntax, which is not vulnerable. Conduct thorough code reviews to identify and refactor any direct HasKey usage with dynamic or user-supplied data. Implement strict input validation and sanitization on all inputs that interact with database queries. Employ Web Application Firewalls (WAFs) with SQL injection detection rules tailored for Oracle SQL syntax to provide an additional layer of defense. Monitor application logs and database query logs for suspicious activity indicative of SQL injection attempts. Finally, maintain an incident response plan ready to address potential exploitation attempts promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc2b7ef31ef0b55ab00

Added to database: 2/25/2026, 9:38:10 PM

Last enriched: 2/26/2026, 1:48:29 AM

Last updated: 2/26/2026, 9:14:06 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats