Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-44420

Опубликовано: 08 дек. 2021
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5
CVSS3: 7.3

Описание

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

2:3.2.11-1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

2:2.2.12-1ubuntu0.8
esm-infra/xenial

not-affected

code not present
focal

released

2:2.2.12-1ubuntu0.8
hirsute

released

2:2.2.20-1ubuntu0.3
impish

released

2:2.2.24-1ubuntu1.1
jammy

released

2:3.2.11-1

Показывать по

EPSS

Процентиль: 29%
0.00099
Низкий

7.5 High

CVSS2

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
nvd
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

CVSS3: 7.3
debian
больше 3 лет назад

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, ...

CVSS3: 7.3
github
больше 3 лет назад

Potential bypass of an upstream access control based on URL paths in Django

oracle-oval
около 3 лет назад

ELSA-2022-9341: ol-automation-manager security update (IMPORTANT)

EPSS

Процентиль: 29%
0.00099
Низкий

7.5 High

CVSS2

7.3 High

CVSS3