Vulnerability Name: | CVE-2021-31542 (CCN-201213) | ||||||||||||||||||||||||||||||||
Assigned: | 2021-05-04 | ||||||||||||||||||||||||||||||||
Published: | 2021-05-04 | ||||||||||||||||||||||||||||||||
Updated: | 2022-06-28 | ||||||||||||||||||||||||||||||||
Summary: | In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-22 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-31542 Source: MISC Type: Mailing List, Patch, Third Party Advisory http://www.openwall.com/lists/oss-security/2021/05/04/3 Source: MISC Type: Patch, Vendor Advisory https://docs.djangoproject.com/en/3.2/releases/security/ Source: XF Type: UNKNOWN django-cve202131542-dir-traversal(201213) Source: CCN Type: Django GIT Repository [3.2.x] Fixed CVE-2021-31542 -- Tightened path & file name sanitation Source: MISC Type: Release Notes, Third Party Advisory https://groups.google.com/forum/#!forum/django-announce Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-e7fd530688 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-01044b8a59 Source: CCN Type: oss-sec Mailing List, Tue, 4 May 2021 10:58:23 +0200 Django 3.2.1, 3.1.9, and 2.2.21: CVE-2021-31542: Potential directory-traversal via uploaded files Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210618-0001/ Source: MISC Type: Release Notes, Vendor Advisory https://www.djangoproject.com/weblog/2021/may/04/security-releases/ | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |