Arch Linux alert ASA-202102-18 (python-django)
| From: | Remi Gacogne via arch-security <arch-security@lists.archlinux.org> | |
| To: | arch-security@archlinux.org | |
| Subject: | [ASA-202102-18] python-django: directory traversal | |
| Date: | Fri, 12 Feb 2021 08:10:00 +0100 | |
| Message-ID: | <92e12a27-79f6-1fda-4d02-d3635ae83154@archlinux.org> | |
| Cc: | Remi Gacogne <rgacogne@archlinux.org> |
Arch Linux Security Advisory ASA-202102-18 ========================================== Severity: Low Date : 2021-02-07 CVE-ID : CVE-2021-3281 Package : python-django Type : directory traversal Remote : No Link : https://security.archlinux.org/AVG-1518 Summary ======= The package python-django before version 3.1.6-1 is vulnerable to directory traversal. Resolution ========== Upgrade to 3.1.6-1. # pacman -Syu "python-django>=3.1.6-1" The problem has been fixed upstream in version 3.1.6. Workaround ========== None. Description =========== In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. Impact ====== An attacker might be able to write files in arbitrary file system locations by tricking the user to select a crafted template file that leads to directory traversal. References ========== https://www.djangoproject.com/weblog/2021/feb/01/security... https://github.com/django/django/commit/02e6592835b455990... https://security.archlinux.org/CVE-2021-3281
