First published: Thu Dec 09 2021(Updated: )
Security Fix(es):<br><li> Potential directory-traversal via archive.extract() (CVE-2021-3281)</li> <li> potential directory-traversal via uploaded files (CVE-2021-28658)</li> <li> Potential directory-traversal via uploaded files (CVE-2021-31542)</li> <li> Potential directory traversal via ``admindocs`` (CVE-2021-33203)</li> <li> Possible indeterminate SSRF RFI and LFI attacks since validators accepted</li> leading zeros in IPv4 addresses (CVE-2021-33571)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-django20 | <2.0.13-16.el8 | 2.0.13-16.el8 |
redhat/python-django20-bash-completion | <2.0.13-16.el8 | 2.0.13-16.el8 |
redhat/python3-django20 | <2.0.13-16.el8 | 2.0.13-16.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.