7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
django is vulnerable to directory traversal. The vulnerability exists due to the lack of path and file name sanitization for files uploaded, allowing a remote attacker to upload a file in arbitrary locations on the file system.
www.openwall.com/lists/oss-security/2021/05/04/3
django.readthedocs.io/en/latest/releases/security.html#may-4-2021-cve-2021-31542
docs.djangoproject.com/en/3.2/releases/security/
github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d
github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48
github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007
groups.google.com/forum/#!forum/django-announce
lists.debian.org/debian-lts-announce/2021/05/msg00005.html
lists.fedoraproject.org/archives/list/[email protected]/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
lists.fedoraproject.org/archives/list/[email protected]/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/
security.netapp.com/advisory/ntap-20210618-0001/
www.djangoproject.com/weblog/2021/may/04/security-releases/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N