First published: Thu Dec 09 2021(Updated: )
Security Fix(es):<br><li> Potential directory-traversal via archive.extract() (CVE-2021-3281)</li> <li> potential directory-traversal via uploaded files (CVE-2021-28658)</li> <li> Potential directory-traversal via uploaded files (CVE-2021-31542)</li> <li> Potential directory traversal via ``admindocs`` (CVE-2021-33203)</li> <li> Possible indeterminate SSRF RFI and LFI attacks since validators accepted</li> leading zeros in IPv4 addresses (CVE-2021-33571)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-django20 | <2.0.13-16.el8 | 2.0.13-16.el8 |
redhat/python-django20-bash-completion | <2.0.13-16.el8 | 2.0.13-16.el8 |
redhat/python3-django20 | <2.0.13-16.el8 | 2.0.13-16.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2021:5070 addresses potential directory-traversal vulnerabilities via archive.extract() and uploaded files.
The severity of RHSA-2021:5070 is classified as important due to the potential impact of directory traversal attacks.
To fix the vulnerabilities in RHSA-2021:5070, update the affected packages to versions 2.0.13-16.el8 or later.
The affected packages in RHSA-2021:5070 include python-django20, python-django20-bash-completion, and python3-django20.
RHSA-2021:5070 is applicable to systems using Red Hat Enterprise Linux 8 with the affected packages installed.