Name | CVE-2021-44420 |
Description | In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-django (PTS) | buster | 1:1.11.29-1~deb10u1 | fixed |
buster (security) | 1:1.11.29-1+deb10u8 | fixed | |
bullseye (security), bullseye | 2:2.2.28-1~deb11u1 | fixed | |
bookworm, sid | 3:3.2.19-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-django | source | stretch | (not affected) | |||
python-django | source | buster | (not affected) | |||
python-django | source | bullseye | 2:2.2.25-1~deb11u1 | |||
python-django | source | (unstable) | 2:3.2.10-1 |
[buster] - python-django <not-affected> (Vulnerable code not present; is_endpoint support added later)
[stretch] - python-django <not-affected> (Vulnerable code not present; path converters added later)
https://www.openwall.com/lists/oss-security/2021/12/07/1
https://www.djangoproject.com/weblog/2021/dec/07/security-releases/
https://github.com/django/django/commit/333c65603032c377e682cdbd7388657a5463a05a (3.2.10)
https://github.com/django/django/commit/7cf7d74e8a754446eeb85cacf2fef1247e0cb6d7 (2.2.25)