Vulnerability Name:

CVE-2021-3281 (CCN-195976)

Assigned:2021-02-01
Published:2021-02-01
Updated:2021-03-05
Summary:In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
CVSS v3 Severity:5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-22
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-3281

Source: MISC
Type: Patch, Vendor Advisory
https://docs.djangoproject.com/en/3.1/releases/security/

Source: XF
Type: UNKNOWN
django-cve20213281-dir-traversal(195976)

Source: MISC
Type: Third Party Advisory
https://groups.google.com/forum/#!forum/django-announce

Source: FEDORA
Type: Third Party Advisory
FEDORA-2021-5329c680f7

Source: CCN
Type: oss-sec Mailing List, Mon, 1 Feb 2021 10:44:09 +0100
Django: CVE-2021-3281: Potential directory-traversal via archive.extract()

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210226-0004/

Source: CCN
Type: Django Web site
Django security releases issued: 3.1.6, 3.0.12, and 2.2.18

Source: CONFIRM
Type: Vendor Advisory
https://www.djangoproject.com/weblog/2021/feb/01/security-releases/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:djangoproject:django:*:*:*:*:*:*:*:* (Version >= 2.2 and < 2.2.18)
  • OR cpe:/a:djangoproject:django:*:*:*:*:*:*:*:* (Version >= 3.0 and < 3.0.12)
  • OR cpe:/a:djangoproject:django:*:*:*:*:*:*:*:* (Version >= 3.1 and < 3.1.6)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:djangoproject:django:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:81082
    P
    Security update for crowbar-openstack, grafana, kibana, monasca-installer, python-Django, python-py, rubygem-activerecord-session_store (Moderate)
    2021-06-11
    BACK
    djangoproject django *
    djangoproject django *
    djangoproject django *
    fedoraproject fedora 33
    netapp snapcenter -
    djangoproject django 3.0
    djangoproject django 2.2
    djangoproject django 3.1