Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-44420

Опубликовано: 08 дек. 2021
Источник: debian
EPSS Низкий

Описание

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed2:3.2.10-1package
python-djangofixed2:2.2.25-1~deb11u1bullseyepackage
python-djangonot-affectedbusterpackage
python-djangonot-affectedstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/12/07/1

  • https://www.djangoproject.com/weblog/2021/dec/07/security-releases/

  • https://github.com/django/django/commit/333c65603032c377e682cdbd7388657a5463a05a (3.2.10)

  • https://github.com/django/django/commit/7cf7d74e8a754446eeb85cacf2fef1247e0cb6d7 (2.2.25)

EPSS

Процентиль: 34%
0.00134
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 4 года назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 5.3
redhat
почти 4 года назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
nvd
почти 4 года назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
github
почти 4 года назад

Potential bypass of an upstream access control based on URL paths in Django

oracle-oval
больше 3 лет назад

ELSA-2022-9341: ol-automation-manager security update (IMPORTANT)

EPSS

Процентиль: 34%
0.00134
Низкий