Vulnerability Name: | CVE-2021-32052 (CCN-201374) | ||||||||||||
Assigned: | 2021-05-06 | ||||||||||||
Published: | 2021-05-06 | ||||||||||||
Updated: | 2022-01-01 | ||||||||||||
Summary: | In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
4.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32052 Source: MISC Type: Mailing List, Patch, Third Party Advisory http://www.openwall.com/lists/oss-security/2021/05/06/1 Source: MISC Type: Patch, Vendor Advisory https://docs.djangoproject.com/en/3.2/releases/security/ Source: XF Type: UNKNOWN django-cve202132052-header-injection(201374) Source: MISC Type: Mailing List, Third Party Advisory https://groups.google.com/forum/#!forum/django-announce Source: FEDORA Type: Third Party Advisory FEDORA-2021-01044b8a59 Source: CCN Type: oss-sec Mailing List, Thu, 6 May 2021 09:50:26 +0200 Django: CVE-2021-32052: Header injection possibility since URLValidator accepted newlines in input on Python 3.9.5+ Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210611-0002/ Source: CCN Type: Django Web site Django security releases issued: 3.2.2, 3.1.10, and 2.2.22 Source: MISC Type: Patch, Vendor Advisory https://www.djangoproject.com/weblog/2021/may/06/security-releases/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |