First published: Mon May 31 2021(Updated: )
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django | >=3.2.0<3.2.4 | 3.2.4 |
pip/django | >=3.0.0<3.1.12 | 3.1.12 |
pip/django | >=2.2.0<2.2.24 | 2.2.24 |
Djangoproject Django | >=2.2<2.2.24 | |
Djangoproject Django | >=3.0<3.1.12 | |
Djangoproject Django | >=3.2<3.2.4 | |
Fedoraproject Fedora | =35 | |
redhat/python-django20 | <0:2.0.13-16.el8 | 0:2.0.13-16.el8 |
redhat/python3-django | <0:2.2.24-1.el7 | 0:2.2.24-1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-33571.
The severity of CVE-2021-33571 is high with a CVSS score of 7.5.
The affected software is Django versions 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4.
The vulnerability allows a bypass of access control that is based on IP addresses.
To fix CVE-2021-33571, update Django to version 3.2.4, 3.1.12, or 2.2.24, depending on the installed version.