Vulnerability Name: | CVE-2020-24583 (CCN-187640) | ||||||||||||
Assigned: | 2020-09-01 | ||||||||||||
Published: | 2020-09-01 | ||||||||||||
Updated: | 2022-10-07 | ||||||||||||
Summary: | An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-276 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-24583 Source: MISC Type: Patch, Vendor Advisory https://docs.djangoproject.com/en/dev/releases/security/ Source: XF Type: UNKNOWN django-cve202024583-sec-bypass(187640) Source: MISC Type: Third Party Advisory https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM Source: MISC Type: Third Party Advisory https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-94407454d7 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-9c6b391162 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-6941c0a65b Source: CCN Type: oss-sec Mailing List, Tue, 1 Sep 2020 11:23:07 +0200 Django Security Releases for CVE-2020-24583 & CVE-2020-24584: permissions on intermediate-level directories on Python 3.7+ Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20200918-0004/ Source: UBUNTU Type: Third Party Advisory USN-4479-1 Source: CCN Type: Django Web site Django Source: MISC Type: Vendor Advisory https://www.djangoproject.com/weblog/2020/sep/01/security-releases/ Source: MISC Type: Mailing List, Patch, Third Party Advisory https://www.openwall.com/lists/oss-security/2020/09/01/2 Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2021.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |