|
|
Log in / Subscribe / Register

Arch Linux alert ASA-202102-18 (python-django)

From:  Remi Gacogne via arch-security <arch-security@lists.archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-202102-18] python-django: directory traversal
Date:  Fri, 12 Feb 2021 08:10:00 +0100
Message-ID:  <92e12a27-79f6-1fda-4d02-d3635ae83154@archlinux.org>
Cc:  Remi Gacogne <rgacogne@archlinux.org>

Arch Linux Security Advisory ASA-202102-18 ========================================== Severity: Low Date : 2021-02-07 CVE-ID : CVE-2021-3281 Package : python-django Type : directory traversal Remote : No Link : https://security.archlinux.org/AVG-1518 Summary ======= The package python-django before version 3.1.6-1 is vulnerable to directory traversal. Resolution ========== Upgrade to 3.1.6-1. # pacman -Syu "python-django>=3.1.6-1" The problem has been fixed upstream in version 3.1.6. Workaround ========== None. Description =========== In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. Impact ====== An attacker might be able to write files in arbitrary file system locations by tricking the user to select a crafted template file that leads to directory traversal. References ========== https://www.djangoproject.com/weblog/2021/feb/01/security... https://github.com/django/django/commit/02e6592835b455990... https://security.archlinux.org/CVE-2021-3281


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds