Safety vulnerability ID: 39521
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Django 2.2.18, 3.0.12 and 3.1.6 include a fix for CVE-2021-3281: The django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
Latest version: 5.1.4
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
==========================
*February 1, 2021*
Django 3.1.6 fixes a security issue with severity "low" and a bug in 3.1.5.
CVE-2021-3281: Potential directory-traversal via ``archive.extract()``
======================================================================
The ``django.utils.archive.extract()`` function, used by
:option:`startapp --template` and :option:`startproject --template`, allowed
directory-traversal via an archive with absolute paths or relative paths with
dot segments.
Bugfixes
========
* Fixed an admin layout issue in Django 3.1 where changelist filter controls
would become squashed (:ticket:`32391`).
==========================
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application