Name | CVE-2021-33571 |
Description | In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2676-1, DLA-3744-1 |
Debian Bugs | 989394 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-django (PTS) | bullseye (security), bullseye | 2:2.2.28-1~deb11u2 | fixed |
bookworm, bookworm (security) | 3:3.2.19-1+deb12u1 | fixed | |
sid, trixie | 3:4.2.16-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-django | source | stretch | 1:1.10.7-2+deb9u14 | DLA-2676-1 | ||
python-django | source | buster | 1:1.11.29-1+deb10u11 | DLA-3744-1 | ||
python-django | source | (unstable) | 2:2.2.24-1 | 989394 |
https://www.openwall.com/lists/oss-security/2021/06/02/1
https://github.com/django/django/commit/e1d787f1b36d13b95187f8f425425ae1b98da188 (main)
https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc (2.2.24)