Safety vulnerability ID: 40638
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Django 2.2.24, 3.1.12, and 3.2.4 include a fix for CVE-2021-33571: In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+).
https://www.djangoproject.com/weblog/2021/jun/02/security-releases
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . See CVE-2021-33571.
CONFIRM:https://www.djangoproject.com/weblog/2021/jun/02/security-releases/: https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
MISC:https://docs.djangoproject.com/en/3.2/releases/security/: https://docs.djangoproject.com/en/3.2/releases/security/
MISC:https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo: https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application