Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-39330
HistoryJul 09, 2024 - 12:00 a.m.

CVE-2024-39330

2024-07-0900:00:00
ubuntu.com
ubuntu.com
7
django
storage
directory traversal
file path validations
sub-classes
vulnerability

AI Score

6.2

Confidence

Low

EPSS

0

Percentile

15.8%

An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14.
Derived classes of the django.core.files.storage.Storage base class, when
they override generate_filename() without replicating the file-path
validations from the parent class, potentially allow directory traversal
via certain inputs during a save() call. (Built-in Storage sub-classes are
unaffected.)

Notes

Author Note
Priority reason: Does not affect any of the built-in classes
alexmurray upstream advises that only versions 4.2, 5.0 and 5.1 (plus main development branch) are affected but it is likely earlier versions may also be affected but upstream do not mention this as they are no longer maintained by them
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchpython-django< 1:1.11.11-1ubuntu1.21+esm5UNKNOWN
ubuntu20.04noarchpython-django< 2:2.2.12-1ubuntu0.23UNKNOWN
ubuntu22.04noarchpython-django< 2:3.2.12-2ubuntu1.12UNKNOWN
ubuntu23.10noarchpython-django< 3:4.2.4-1ubuntu2.3UNKNOWN
ubuntu24.04noarchpython-django< 3:4.2.11-1ubuntu1.1UNKNOWN
ubuntu14.04noarchpython-django< anyUNKNOWN
ubuntu16.04noarchpython-django< anyUNKNOWN