Direct String Concatenation in raw() Queries
User input from HTTP requests is directly concatenated or formatted into SQL strings passed to QuerySet.raw().
SQL injection vulnerability where untrusted request values are inserted into raw SQL strings without parameterization when calling QuerySet.raw(), potentially allowing attackers to read, modify, or delete database data and execute unintended SQL commands.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
User input from HTTP requests is directly concatenated or formatted into SQL strings passed to QuerySet.raw().
Sourcery automatically identifies sql injection from http request data in django raw() query and many other security issues in your codebase.