2021-05-25 10:38:20 +02:00
|
|
|
===========================
|
|
|
|
Django 2.2.24 release notes
|
|
|
|
===========================
|
|
|
|
|
2021-06-02 10:19:19 +02:00
|
|
|
*June 2, 2021*
|
2021-05-25 10:38:20 +02:00
|
|
|
|
|
|
|
Django 2.2.24 fixes two security issues in 2.2.23.
|
|
|
|
|
2021-05-17 11:26:36 +02:00
|
|
|
CVE-2021-33203: Potential directory traversal via ``admindocs``
|
|
|
|
===============================================================
|
|
|
|
|
|
|
|
Staff members could use the :mod:`~django.contrib.admindocs`
|
|
|
|
``TemplateDetailView`` view to check the existence of arbitrary files.
|
|
|
|
Additionally, if (and only if) the default admindocs templates have been
|
|
|
|
customized by the developers to also expose the file contents, then not only
|
|
|
|
the existence but also the file contents would have been exposed.
|
|
|
|
|
|
|
|
As a mitigation, path sanitation is now applied and only files within the
|
|
|
|
template root directories can be loaded.
|
2021-05-24 09:55:14 +02:00
|
|
|
|
|
|
|
CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
|
|
|
|
===========================================================================================================================
|
|
|
|
|
|
|
|
:class:`~django.core.validators.URLValidator`,
|
|
|
|
:func:`~django.core.validators.validate_ipv4_address`, and
|
|
|
|
:func:`~django.core.validators.validate_ipv46_address` didn't prohibit leading
|
|
|
|
zeros in octal literals. If you used such values you could suffer from
|
|
|
|
indeterminate SSRF, RFI, and LFI attacks.
|
|
|
|
|
|
|
|
:func:`~django.core.validators.validate_ipv4_address` and
|
|
|
|
:func:`~django.core.validators.validate_ipv46_address` validators were not
|
|
|
|
affected on Python 3.9.5+.
|