Xcov19 / covidX

covidX. Rapid Pandemic Task Mgmt Portal
GNU General Public License v3.0
7 stars 17 forks source link

CVE-2021-3281 (Medium) detected in Django-1.11.29-py2.py3-none-any.whl #105

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2021-3281 - Medium Severity Vulnerability

Vulnerable Library - Django-1.11.29-py2.py3-none-any.whl

A high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Library home page: https://files.pythonhosted.org/packages/49/49/178daa8725d29c475216259eb19e90b2aa0b8c0431af8c7e9b490ae6481d/Django-1.11.29-py2.py3-none-any.whl

Path to dependency file: covidX/requirements.txt

Path to vulnerable library: covidX/requirements.txt

Dependency Hierarchy: - graphene_django-2.13.0-py2.py3-none-any.whl (Root Library) - :x: **Django-1.11.29-py2.py3-none-any.whl** (Vulnerable Library)

Found in HEAD commit: 6f3dbcb5ab003a4ef1776b72be10967612787631

Vulnerability Details

In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.

Publish Date: 2021-02-02

URL: CVE-2021-3281

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.djangoproject.com/weblog/2021/feb/01/security-releases/

Release Date: 2021-02-02

Fix Resolution: 2.2.18,3.0.12,3.1.6


Step up your Open Source Security Game with WhiteSource here

Aaron-1974 commented 2 years ago

Hi, do you still need help with this?