CVE-2021-33571
Published: 2 June 2021
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
Notes
Author | Note |
---|---|
mdeslaur | Python earlier than 3.8.0 is not vulnerable to CVE-2021-29921, so django in bionic and earlier do not require fixes |
Priority
Status
Package | Release | Status |
---|---|---|
python-django Launchpad, Ubuntu, Debian |
focal |
Released
(2:2.2.12-1ubuntu0.7)
|
groovy |
Released
(2:2.2.16-1ubuntu0.5)
|
|
hirsute |
Released
(2:2.2.20-1ubuntu0.2)
|
|
impish |
Released
(2:2.2.24-1)
|
|
jammy |
Released
(2:2.2.24-1)
|
|
upstream |
Released
(2.2.24)
|
|
xenial |
Not vulnerable
|
|
bionic |
Not vulnerable
(1:1.11.11-1ubuntu1.13)
|
|
trusty |
Not vulnerable
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |