Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-44420

Опубликовано: 08 дек. 2021
Источник: debian

Описание

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed2:3.2.10-1package
python-djangofixed2:2.2.25-1~deb11u1bullseyepackage
python-djangonot-affectedbusterpackage
python-djangonot-affectedstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/12/07/1

  • https://www.djangoproject.com/weblog/2021/dec/07/security-releases/

  • https://github.com/django/django/commit/333c65603032c377e682cdbd7388657a5463a05a (3.2.10)

  • https://github.com/django/django/commit/7cf7d74e8a754446eeb85cacf2fef1247e0cb6d7 (2.2.25)

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 5.3
redhat
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
nvd
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
github
больше 3 лет назад

Potential bypass of an upstream access control based on URL paths in Django

oracle-oval
около 3 лет назад

ELSA-2022-9341: ol-automation-manager security update (IMPORTANT)