![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-3281 |
Description: | In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.892540 1.3.6.1.4.1.25623.1.0.878931 1.3.6.1.4.1.25623.1.0.112859 1.3.6.1.4.1.25623.1.0.112858 1.3.6.1.4.1.25623.1.1.12.2021.4715.2 1.3.6.1.4.1.25623.1.0.844811 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-3281 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/ https://docs.djangoproject.com/en/3.1/releases/security/ https://groups.google.com/forum/#!forum/django-announce |