Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-44420

Опубликовано: 07 дек. 2021
Источник: redhat
CVSS3: 5.3

Описание

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 1.2python-djangoAffected
Red Hat Ansible Automation Platform 2python-djangoAffected
Red Hat Ansible Tower 3djangoAffected
Red Hat Ceph Storage 2calamari-serverOut of support scope
Red Hat Ceph Storage 2python-djangoOut of support scope
Red Hat Ceph Storage 3python-djangoOut of support scope
Red Hat OpenStack Platform 10 (Newton)python-djangoOut of support scope
Red Hat OpenStack Platform 13 (Queens)python-djangoOut of support scope
Red Hat OpenStack Platform 16.1python-django20Not affected
Red Hat OpenStack Platform 16.2python-django20Not affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-290
https://bugzilla.redhat.com/show_bug.cgi?id=2028178django: potential bypass of an upstream access control based on URL paths

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
nvd
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
debian
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, ...

CVSS3: 7.3
github
больше 3 лет назад

Potential bypass of an upstream access control based on URL paths in Django

oracle-oval
около 3 лет назад

ELSA-2022-9341: ol-automation-manager security update (IMPORTANT)

5.3 Medium

CVSS3