Vulnerability Name: | CVE-2021-45116 (CCN-216623) | ||||||||||||
Assigned: | 2021-12-16 | ||||||||||||
Published: | 2022-01-04 | ||||||||||||
Updated: | 2022-02-11 | ||||||||||||
Summary: | An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-668 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-45116 Source: MISC Type: Patch, Vendor Advisory https://docs.djangoproject.com/en/4.0/releases/security/ Source: XF Type: UNKNOWN django-cve202145116-info-disc(216623) Source: MISC Type: Third Party Advisory https://groups.google.com/forum/#!forum/django-announce Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-e7fd530688 Source: CCN Type: oss-sec Mailing List, Tue, 4 Jan 2022 11:06:35 +0100 Django security releases issued: 4.0.1, 3.2.11, and 2.2.26 (Multiple CVEs) Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220121-0005/ Source: CCN Type: Django Web site Django security releases issued: 4.0.1, 3.2.11, and 2.2.26 Source: CONFIRM Type: Patch, Vendor Advisory https://www.djangoproject.com/weblog/2022/jan/04/security-releases/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |