First published: Mon May 31 2021(Updated: )
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-django20 | <0:2.0.13-16.el8 | 0:2.0.13-16.el8 |
redhat/python3-django | <0:2.2.24-1.el7 | 0:2.2.24-1.el7 |
Djangoproject Django | >=2.2<2.2.24 | |
Djangoproject Django | >=3.0<3.1.12 | |
Djangoproject Django | >=3.2<3.2.4 | |
Fedoraproject Fedora | =35 | |
redhat/Django | <3.2.4 | 3.2.4 |
redhat/Django | <3.1.12 | 3.1.12 |
redhat/Django | <2.2.24 | 2.2.24 |
pip/Django | >=3.2a1<3.2.4 | 3.2.4 |
pip/Django | >=3.0a1<3.1.12 | 3.1.12 |
pip/Django | >=2.2a1<2.2.24 | 2.2.24 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-33571.
The severity of CVE-2021-33571 is high with a CVSS score of 7.5.
The affected software is Django versions 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4.
The vulnerability allows a bypass of access control that is based on IP addresses.
To fix CVE-2021-33571, update Django to version 3.2.4, 3.1.12, or 2.2.24, depending on the installed version.