Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-28658

Опубликовано: 06 апр. 2021
Источник: debian
EPSS Низкий

Описание

In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed2:2.2.20-1package

Примечания

  • https://www.djangoproject.com/weblog/2021/apr/06/security-releases/

  • https://github.com/django/django/commit/d4d800ca1addc4141e03c5440a849bb64d1582cd (main)

  • https://github.com/django/django/commit/4036d62bda0e9e9f6172943794b744a454ca49c2 (2.2.20)

EPSS

Процентиль: 83%
0.02091
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 4 лет назад

In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.

CVSS3: 5.3
redhat
около 4 лет назад

In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.

CVSS3: 5.3
nvd
около 4 лет назад

In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.

CVSS3: 5.3
github
около 4 лет назад

Directory Traversal in Django

CVSS3: 5.3
fstec
около 4 лет назад

Уязвимость компонента MultiPartParser программной платформы для веб-приложений Django, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 83%
0.02091
Низкий