Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-59682

Опубликовано: 01 окт. 2025
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.

A flaw was found in Django. The django.utils.archive.extract() function, used by startapp --templateand startproject --template, allowed partial directory-traversal via an archive with file paths sharing a common prefix with the target directory.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 3openshift-service-mesh/istio-cni-rhel9Not affected
OpenShift Service Mesh 3openshift-service-mesh/istio-must-gather-rhel9Not affected
OpenShift Service Mesh 3openshift-service-mesh/istio-pilot-rhel9Not affected
OpenShift Service Mesh 3openshift-service-mesh/istio-proxyv2-rhel9Affected
OpenShift Service Mesh 3openshift-service-mesh/istio-rhel9-operatorNot affected
OpenShift Service Mesh 3openshift-service-mesh/istio-sail-operator-bundleNot affected
OpenShift Service Mesh 3openshift-service-mesh-tech-preview/istio-ztunnel-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/lightspeed-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/ansible-dev-tools-rhel8Not affected
Red Hat Ansible Automation Platform 2automation-controllerNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2400450django: Potential partial directory-traversal via archive.extract()

EPSS

Процентиль: 5%
0.0002
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 3.1
ubuntu
6 месяцев назад

An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.

CVSS3: 3.1
nvd
6 месяцев назад

An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.

CVSS3: 3.1
debian
6 месяцев назад

An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13 ...

CVSS3: 3.1
github
6 месяцев назад

Django vulnerable to partial directory traversal via archives

CVSS3: 3.1
fstec
6 месяцев назад

Уязвимость функции django.utils.archive.extract() программной платформы для веб-приложений Django, позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 5%
0.0002
Низкий

8.8 High

CVSS3