Vulnerability Name: | CVE-2021-33571 (CCN-202893) | ||||||||||||||||||||||||||||||||
Assigned: | 2021-06-02 | ||||||||||||||||||||||||||||||||
Published: | 2021-06-02 | ||||||||||||||||||||||||||||||||
Updated: | 2022-02-22 | ||||||||||||||||||||||||||||||||
Summary: | In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-918 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-33571 Source: MISC Type: Patch, Vendor Advisory https://docs.djangoproject.com/en/3.2/releases/security/ Source: XF Type: UNKNOWN django-cve202133571-ssrf(202893) Source: MISC Type: Mailing List, Third Party Advisory https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-e7fd530688 Source: CCN Type: oss-sec Mailing List, Wed, 2 Jun 2021 11:34:09 +0200 Django security releases 3.2.4, 3.1.12, and 2.2.24 for CVE-2021-33203 and CVE-2021-33571 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210727-0004/ Source: CCN Type: Django Web site Django Source: CONFIRM Type: Patch, Vendor Advisory https://www.djangoproject.com/weblog/2021/jun/02/security-releases/ | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |