CVE Vulnerabilities

CVE-2021-33571

Server-Side Request Forgery (SSRF)

Published: Jun 08, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM

In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

Name Vendor Start Version End Version
Django Djangoproject 2.2 (including) 2.2.24 (excluding)
Django Djangoproject 3.0 (including) 3.1.12 (excluding)
Django Djangoproject 3.2 (including) 3.2.4 (excluding)
Red Hat OpenStack Platform 16.1 RedHat python-django20-0:2.0.13-16.el8ost.1 *
Red Hat OpenStack Platform 16.2 RedHat python-django20-0:2.0.13-16.el8ost.1 *
Red Hat Satellite 6.10 for RHEL 7 RedHat python3-django-0:2.2.24-1.el7pc *
Red Hat Satellite 6.10 for RHEL 7 RedHat python3-django-0:2.2.24-1.el7pc *
Python-django Ubuntu devel *
Python-django Ubuntu focal *
Python-django Ubuntu groovy *
Python-django Ubuntu hirsute *
Python-django Ubuntu impish *
Python-django Ubuntu jammy *
Python-django Ubuntu trusty *
Python-django Ubuntu upstream *
Python-django Ubuntu xenial *

References