First published: Tue Jan 04 2022(Updated: )
An information-disclosure flaw was found in Django, where the dictsort filter in Django's Template Language did not correctly validate user input. A network attacker could exploit this flaw using a suitably crafted key to force information disclosure or unintended method calls.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-django | <0:3.2.13-1.el8 | 0:3.2.13-1.el8 |
Djangoproject Django | >=2.2<2.2.26 | |
Djangoproject Django | >=3.2<3.2.11 | |
Djangoproject Django | >=4.0<4.0.1 | |
Fedoraproject Fedora | =35 | |
redhat/Django | <4.0.1 | 4.0.1 |
redhat/Django | <3.2.11 | 3.2.11 |
redhat/Django | <2.2.26 | 2.2.26 |
pip/Django | >=4.0<4.0.1 | 4.0.1 |
pip/Django | >=3.2<3.2.11 | 3.2.11 |
pip/Django | >=2.2<2.2.26 | 2.2.26 |
>=2.2<2.2.26 | ||
>=3.2<3.2.11 | ||
>=4.0<4.0.1 | ||
=35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45116 is an information-disclosure vulnerability in Django.
The severity of CVE-2021-45116 is high, with a CVSS score of 7.5.
Django versions before 2.2.26, 3.2.11, and 4.0.1 are affected by CVE-2021-45116.
To fix CVE-2021-45116, update Django to version 2.2.26, 3.2.11, or 4.0.1.
You can find more information about CVE-2021-45116 in the official Django documentation and the Django announce mailing list.