Debian 10218 Published by

A python-django security update has been released for Debian GNU/Linux 8 Extended LTS to address two security issues.



ELA-440-1 python-django security update

Package python-django
Version 1.7.11-1+deb8u14
Related CVEs CVE-2021-33203 CVE-2021-33571

Two issues were discovered in Django, the Python-based web development framework:

* CVE-2021-33203: Potential directory traversal via admindocs

Staff members could use the admindocs TemplateDetailView view to
check the existence of arbitrary files. Additionally, if (and only if) the
default admindocs templates have been customized by the developers to also
expose the file contents, then not only the existence but also the file
contents would have been exposed.

As a mitigation, path sanitation is now applied and only files within the
template root directories can be loaded.

This issue has low severity, according to the Django security policy.

Thanks to Rasmus Lerchedahl Petersen and Rasmus Wriedt Larsen from the CodeQL
Python team for the report.

* CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks
since validators accepted leading zeros in IPv4 addresses

URLValidator, validate_ipv4_address(), and validate_ipv46_address() didn't
prohibit leading zeros in octal literals. If you used such values you could
suffer from indeterminate SSRF, RFI, and LFI attacks.

validate_ipv4_address() and validate_ipv46_address() validators were not
affected on Python 3.9.5+.

This issue has medium severity, according to the Django security policy.
For Debian 8 Jessie, these problems have been fixed in version 1.7.11-1+deb8u14.

We recommend that you upgrade your python-django packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

  ELA-440-1 python-django security update