In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://docs.djangoproject.com/en/3.1/releases/security/ | vendor advisory |
https://groups.google.com/g/django-announce/c/ePr5j-ngdPU | third party advisory mailing list |
https://www.djangoproject.com/weblog/2021/apr/06/security-releases/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20210528-0001/ | third party advisory |