First published: Mon Jan 25 2021(Updated: )
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django | >=3.0<3.0.12 | 3.0.12 |
pip/django | >=3.1<3.1.6 | 3.1.6 |
pip/django | >=2.2<2.2.18 | 2.2.18 |
redhat/automation-hub | <0:4.2.2-1.el7 | 0:4.2.2-1.el7 |
redhat/python3-django | <0:2.2.18-1.el7 | 0:2.2.18-1.el7 |
redhat/python-bleach | <0:3.3.0-1.el7 | 0:3.3.0-1.el7 |
redhat/python-bleach-allowlist | <0:1.0.3-1.el7 | 0:1.0.3-1.el7 |
redhat/python-galaxy-importer | <0:0.2.15-1.el7 | 0:0.2.15-1.el7 |
redhat/python-galaxy-ng | <0:4.2.2-1.el7 | 0:4.2.2-1.el7 |
redhat/python-pulp-ansible | <1:0.5.6-1.el7 | 1:0.5.6-1.el7 |
redhat/automation-hub | <0:4.2.2-1.el8 | 0:4.2.2-1.el8 |
redhat/python3-django | <0:2.2.18-1.el8 | 0:2.2.18-1.el8 |
redhat/python-bleach | <0:3.3.0-1.el8 | 0:3.3.0-1.el8 |
redhat/python-bleach-allowlist | <0:1.0.3-1.el8 | 0:1.0.3-1.el8 |
redhat/python-galaxy-importer | <0:0.2.15-1.el8 | 0:0.2.15-1.el8 |
redhat/python-galaxy-ng | <0:4.2.2-1.el8 | 0:4.2.2-1.el8 |
redhat/python-pulp-ansible | <1:0.5.6-1.el8 | 1:0.5.6-1.el8 |
redhat/python-django20 | <0:2.0.13-16.el8 | 0:2.0.13-16.el8 |
Djangoproject Django | >=2.2<2.2.18 | |
Djangoproject Django | >=3.0<3.0.12 | |
Djangoproject Django | >=3.1<3.1.6 | |
Fedoraproject Fedora | =33 | |
Netapp Snapcenter | ||
redhat/Django | <2.2.18 | 2.2.18 |
redhat/Django | <3.0.12 | 3.0.12 |
redhat/Django | <3.1.6 | 3.1.6 |
>=2.2<2.2.18 | ||
>=3.0<3.0.12 | ||
>=3.1<3.1.6 | ||
=33 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-3281.
The severity of CVE-2021-3281 is medium with a severity value of 5.3.
The affected software is Django versions 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6.
This vulnerability can be exploited through a directory traversal attack using an archive with absolute paths or relative paths with dot segments.
You can find more information about CVE-2021-3281 in the following references: [link1], [link2], [link3].