In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
References
Link | Resource |
---|---|
https://www.djangoproject.com/weblog/2021/may/04/security-releases/ | Release Notes Vendor Advisory |
https://docs.djangoproject.com/en/3.2/releases/security/ | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2021/05/04/3 | Mailing List Patch Third Party Advisory |
https://groups.google.com/forum/#!forum/django-announce | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/ | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210618-0001/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-05-05 08:15
Updated : 2022-02-25 10:40
NVD link : CVE-2021-31542
Mitre link : CVE-2021-31542
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
debian
- debian_linux
djangoproject
- django
fedoraproject
- fedora