diff options
| author | Mariusz Felisiak <felisiak.mariusz@gmail.com> | 2021-05-24 09:55:14 +0200 |
|---|---|---|
| committer | Carlton Gibson <carlton.gibson@noumenal.es> | 2021-06-02 10:44:39 +0200 |
| commit | 9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d (patch) | |
| tree | 24b1f55302cfd60a9c321ef1c00d70d42c0acd88 /docs/releases/3.1.12.txt | |
| parent | dfaba12cda060b8b292ae1d271b44bf810b1c5b9 (diff) | |
[3.2.x] Fixed CVE-2021-33571 -- Prevented leading zeros in IPv4 addresses.
validate_ipv4_address() was affected only on Python < 3.9.5, see [1].
URLValidator() uses a regular expressions and it was affected on all
Python versions.
[1] https://bugs.python.org/issue36384
Diffstat (limited to 'docs/releases/3.1.12.txt')
| -rw-r--r-- | docs/releases/3.1.12.txt | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/docs/releases/3.1.12.txt b/docs/releases/3.1.12.txt index 7d8ee8447e..0700f40849 100644 --- a/docs/releases/3.1.12.txt +++ b/docs/releases/3.1.12.txt @@ -17,3 +17,16 @@ the existence but also the file contents would have been exposed. As a mitigation, path sanitation is now applied and only files within the template root directories can be loaded. + +CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses +=========================================================================================================================== + +:class:`~django.core.validators.URLValidator`, +:func:`~django.core.validators.validate_ipv4_address`, and +:func:`~django.core.validators.validate_ipv46_address` didn't prohibit leading +zeros in octal literals. If you used such values you could suffer from +indeterminate SSRF, RFI, and LFI attacks. + +:func:`~django.core.validators.validate_ipv4_address` and +:func:`~django.core.validators.validate_ipv46_address` validators were not +affected on Python 3.9.5+. |
