In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
References
Link | Resource |
---|---|
https://docs.djangoproject.com/en/3.2/releases/security/ | Patch Vendor Advisory |
https://groups.google.com/forum/#%21forum/django-announce | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | |
https://security.netapp.com/advisory/ntap-20211229-0006/ | Third Party Advisory |
https://www.djangoproject.com/weblog/2021/dec/07/security-releases/ | Patch Vendor Advisory |
https://www.openwall.com/lists/oss-security/2021/12/07/1 | Mailing List Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
22 Feb 2022, 14:37
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20211229-0006/ - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | |
First Time |
Fedoraproject fedora
Fedoraproject |
11 Feb 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Dec 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2021, 16:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
References | (MISC) https://groups.google.com/forum/#!forum/django-announce - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://www.djangoproject.com/weblog/2021/dec/07/security-releases/ - Patch, Vendor Advisory | |
References | (MISC) https://docs.djangoproject.com/en/3.2/releases/security/ - Patch, Vendor Advisory | |
References | (CONFIRM) https://www.openwall.com/lists/oss-security/2021/12/07/1 - Mailing List, Patch, Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:* cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:satellite:6.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
CWE | CWE-287 |
08 Dec 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-08 00:15
Updated : 2023-12-10 14:09
NVD link : CVE-2021-44420
Mitre link : CVE-2021-44420
CVE.ORG link : CVE-2021-44420
JSON object : View
Products Affected
debian
- debian_linux
djangoproject
- django
fedoraproject
- fedora
redhat
- satellite
canonical
- ubuntu_linux
CWE