Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
References
Link | Resource |
---|---|
https://docs.djangoproject.com/en/3.2/releases/security/ | Patch Vendor Advisory |
https://www.djangoproject.com/weblog/2021/jun/02/security-releases/ | Patch Vendor Advisory |
https://groups.google.com/forum/#!forum/django-announce | Release Notes Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210727-0004/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | Mailing List Third Party Advisory |
Information
Published : 2021-06-08 11:15
Updated : 2022-02-25 10:42
NVD link : CVE-2021-33203
Mitre link : CVE-2021-33203
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
djangoproject
- django
fedoraproject
- fedora