CVE-2021-44420

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:satellite:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-287 NVD-CWE-Other

22 Feb 2022, 14:37

Type Values Removed Values Added
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ - Mailing List, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20211229-0006/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20211229-0006/ - Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

11 Feb 2022, 03:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ -

29 Dec 2021, 21:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20211229-0006/ -

13 Dec 2021, 16:30

Type Values Removed Values Added
CPE cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:satellite:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
CWE CWE-287
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 7.3
References (CONFIRM) https://www.djangoproject.com/weblog/2021/dec/07/security-releases/ - (CONFIRM) https://www.djangoproject.com/weblog/2021/dec/07/security-releases/ - Patch, Vendor Advisory
References (CONFIRM) https://www.openwall.com/lists/oss-security/2021/12/07/1 - (CONFIRM) https://www.openwall.com/lists/oss-security/2021/12/07/1 - Mailing List, Patch, Third Party Advisory
References (MISC) https://groups.google.com/forum/#!forum/django-announce - (MISC) https://groups.google.com/forum/#!forum/django-announce - Mailing List, Third Party Advisory
References (MISC) https://docs.djangoproject.com/en/3.2/releases/security/ - (MISC) https://docs.djangoproject.com/en/3.2/releases/security/ - Patch, Vendor Advisory

08 Dec 2021, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-08 00:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-44420

Mitre link : CVE-2021-44420

CVE.ORG link : CVE-2021-44420


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

djangoproject

  • django

canonical

  • ubuntu_linux

redhat

  • satellite