CVE-2021-3281

NameCVE-2021-3281
DescriptionIn Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2540-1, DLA-3164-1
Debian Bugs981562

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)bullseye (security), bullseye2:2.2.28-1~deb11u2fixed
bookworm, bookworm (security)3:3.2.19-1+deb12u1fixed
sid, trixie3:4.2.16-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosourcestretch1:1.10.7-2+deb9u10DLA-2540-1
python-djangosourcebuster1:1.11.29-1+deb10u2DLA-3164-1
python-djangosource(unstable)2:2.2.18-1981562

Notes

https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23 (master)
https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37 (2.2.18)

Search for package or bug name: Reporting problems