mirror of
https://github.com/django/django.git
synced 2025-08-03 18:38:50 +00:00
Fixed CVE-2021-33571 -- Prevented leading zeros in IPv4 addresses.
validate_ipv4_address() was affected only on Python < 3.9.5, see [1]. URLValidator() uses a regular expressions and it was affected on all Python versions. [1] https://bugs.python.org/issue36384
This commit is contained in:
parent
46572de2e9
commit
e1d787f1b3
7 changed files with 87 additions and 1 deletions
|
@ -17,3 +17,16 @@ the existence but also the file contents would have been exposed.
|
|||
|
||||
As a mitigation, path sanitation is now applied and only files within the
|
||||
template root directories can be loaded.
|
||||
|
||||
CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
|
||||
===========================================================================================================================
|
||||
|
||||
:class:`~django.core.validators.URLValidator`,
|
||||
:func:`~django.core.validators.validate_ipv4_address`, and
|
||||
:func:`~django.core.validators.validate_ipv46_address` didn't prohibit leading
|
||||
zeros in octal literals. If you used such values you could suffer from
|
||||
indeterminate SSRF, RFI, and LFI attacks.
|
||||
|
||||
:func:`~django.core.validators.validate_ipv4_address` and
|
||||
:func:`~django.core.validators.validate_ipv46_address` validators were not
|
||||
affected on Python 3.9.5+.
|
||||
|
|
|
@ -17,3 +17,16 @@ the existence but also the file contents would have been exposed.
|
|||
|
||||
As a mitigation, path sanitation is now applied and only files within the
|
||||
template root directories can be loaded.
|
||||
|
||||
CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
|
||||
===========================================================================================================================
|
||||
|
||||
:class:`~django.core.validators.URLValidator`,
|
||||
:func:`~django.core.validators.validate_ipv4_address`, and
|
||||
:func:`~django.core.validators.validate_ipv46_address` didn't prohibit leading
|
||||
zeros in octal literals. If you used such values you could suffer from
|
||||
indeterminate SSRF, RFI, and LFI attacks.
|
||||
|
||||
:func:`~django.core.validators.validate_ipv4_address` and
|
||||
:func:`~django.core.validators.validate_ipv46_address` validators were not
|
||||
affected on Python 3.9.5+.
|
||||
|
|
|
@ -18,6 +18,19 @@ the existence but also the file contents would have been exposed.
|
|||
As a mitigation, path sanitation is now applied and only files within the
|
||||
template root directories can be loaded.
|
||||
|
||||
CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
|
||||
===========================================================================================================================
|
||||
|
||||
:class:`~django.core.validators.URLValidator`,
|
||||
:func:`~django.core.validators.validate_ipv4_address`, and
|
||||
:func:`~django.core.validators.validate_ipv46_address` didn't prohibit leading
|
||||
zeros in octal literals. If you used such values you could suffer from
|
||||
indeterminate SSRF, RFI, and LFI attacks.
|
||||
|
||||
:func:`~django.core.validators.validate_ipv4_address` and
|
||||
:func:`~django.core.validators.validate_ipv46_address` validators were not
|
||||
affected on Python 3.9.5+.
|
||||
|
||||
Bugfixes
|
||||
========
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue