CVE-2021-33571

NameCVE-2021-33571
DescriptionIn Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2676-1
NVD severitymedium
Debian Bugs989394

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)stretch1:1.10.7-2+deb9u9vulnerable
stretch (security)1:1.10.7-2+deb9u14fixed
buster, buster (security)1:1.11.29-1~deb10u1vulnerable
bullseye2:2.2.24-1fixed
bookworm, sid2:3.2.9-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosourcestretch1:1.10.7-2+deb9u14DLA-2676-1
python-djangosource(unstable)2:2.2.24-1989394

Notes

https://www.openwall.com/lists/oss-security/2021/06/02/1
https://github.com/django/django/commit/e1d787f1b36d13b95187f8f425425ae1b98da188 (main)
https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc (2.2.24)

Search for package or bug name: Reporting problems