In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
References
Link | Resource |
---|---|
https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo | Mailing List Third Party Advisory |
https://docs.djangoproject.com/en/3.2/releases/security/ | Patch Vendor Advisory |
https://www.djangoproject.com/weblog/2021/jun/02/security-releases/ | Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210727-0004/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | Mailing List Third Party Advisory |
Information
Published : 2021-06-08 11:15
Updated : 2022-02-22 06:23
NVD link : CVE-2021-33571
Mitre link : CVE-2021-33571
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
djangoproject
- django
fedoraproject
- fedora