In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
CVE-2021-3281 - Medium Severity Vulnerability
Vulnerable Library - Django-1.11.29-py2.py3-none-any.whl
A high-level Python Web framework that encourages rapid development and clean, pragmatic design.
Library home page: https://files.pythonhosted.org/packages/49/49/178daa8725d29c475216259eb19e90b2aa0b8c0431af8c7e9b490ae6481d/Django-1.11.29-py2.py3-none-any.whl
Path to dependency file: covidX/requirements.txt
Path to vulnerable library: covidX/requirements.txt
Dependency Hierarchy: - graphene_django-2.13.0-py2.py3-none-any.whl (Root Library) - :x: **Django-1.11.29-py2.py3-none-any.whl** (Vulnerable Library)
Found in HEAD commit: 6f3dbcb5ab003a4ef1776b72be10967612787631
Vulnerability Details
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
Publish Date: 2021-02-02
URL: CVE-2021-3281
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
Release Date: 2021-02-02
Fix Resolution: 2.2.18,3.0.12,3.1.6
Step up your Open Source Security Game with WhiteSource here