CVE-2021-3281

NameCVE-2021-3281
DescriptionIn Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2540-1
NVD severitymedium
Debian Bugs981562

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)stretch1:1.10.7-2+deb9u9vulnerable
stretch (security)1:1.10.7-2+deb9u11fixed
buster, buster (security)1:1.11.29-1~deb10u1vulnerable
bullseye, sid2:2.2.19-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosourcestretch1:1.10.7-2+deb9u10DLA-2540-1
python-djangosource(unstable)2:2.2.18-1981562

Notes

[buster] - python-django <no-dsa> (Minor issue)
https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23 (master)
https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37 (2.2.18)

Search for package or bug name: Reporting problems