First published: Tue Jan 04 2022(Updated: )
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-django | <0:3.2.13-1.el8 | 0:3.2.13-1.el8 |
Djangoproject Django | >=2.2<2.2.26 | |
Djangoproject Django | >=3.2<3.2.11 | |
Djangoproject Django | >=4.0<4.0.1 | |
Fedoraproject Fedora | =35 | |
pip/Django | >=4.0.0<4.0.1 | 4.0.1 |
pip/Django | >=3.2.0<3.2.11 | 3.2.11 |
pip/Django | >=2.2.0<2.2.26 | 2.2.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45116 is an information-disclosure vulnerability in Django.
The severity of CVE-2021-45116 is high, with a CVSS score of 7.5.
Django versions before 2.2.26, 3.2.11, and 4.0.1 are affected by CVE-2021-45116.
To fix CVE-2021-45116, update Django to version 2.2.26, 3.2.11, or 4.0.1.
You can find more information about CVE-2021-45116 in the official Django documentation and the Django announce mailing list.