Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2021:5070: Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-django20) security update

An update for python-django20 is now available for Red Hat OpenStack Platform 16.1 (Train). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-3281: django: Potential directory-traversal via archive.extract()
  • CVE-2021-28658: django: potential directory-traversal via uploaded files
  • CVE-2021-31542: django: Potential directory-traversal via uploaded files
  • CVE-2021-33203: django: Potential directory traversal via admindocs
  • CVE-2021-33571: django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
Red Hat Security Data
#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Red Hat Customer Portal

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2021-12-09

Updated:

2021-12-09

RHSA-2021:5070 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat OpenStack Platform 16.1 (python-django20) security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for python-django20 is now available for Red Hat OpenStack
Platform 16.1 (Train).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Description

Security Fix(es):

  • Potential directory-traversal via archive.extract() (CVE-2021-3281)
  • potential directory-traversal via uploaded files (CVE-2021-28658)
  • Potential directory-traversal via uploaded files (CVE-2021-31542)
  • Potential directory traversal via ``admindocs`` (CVE-2021-33203)
  • Possible indeterminate SSRF RFI and LFI attacks since validators accepted

leading zeros in IPv4 addresses (CVE-2021-33571)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

Affected Products

  • Red Hat OpenStack 16.1 x86_64
  • Red Hat OpenStack for IBM Power 16.1 ppc64le

Fixes

  • BZ - 1919969 - CVE-2021-3281 django: Potential directory-traversal via archive.extract()
  • BZ - 1944801 - CVE-2021-28658 django: potential directory-traversal via uploaded files
  • BZ - 1954294 - CVE-2021-31542 django: Potential directory-traversal via uploaded files
  • BZ - 1966251 - CVE-2021-33203 django: Potential directory traversal via ``admindocs``
  • BZ - 1966253 - CVE-2021-33571 django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses

CVEs

  • CVE-2021-3281
  • CVE-2021-28658
  • CVE-2021-31542
  • CVE-2021-33203
  • CVE-2021-33571

Red Hat OpenStack 16.1

SRPM

python-django20-2.0.13-16.el8ost.1.src.rpm

SHA-256: 51456f43e341dd3a6c3a6e48131cf1bbf10f5346e9f990399ace659569abae51

x86_64

python-django20-bash-completion-2.0.13-16.el8ost.1.noarch.rpm

SHA-256: 5b0d41432aa6bfb632e05c4f522daceccef724eca5a3ec1bc392ad97f5da932a

python3-django20-2.0.13-16.el8ost.1.noarch.rpm

SHA-256: c99202f3c634f517ec9bbe5532da859c74185342baaf4bcab8a859bdfc5fd904

Red Hat OpenStack for IBM Power 16.1

SRPM

python-django20-2.0.13-16.el8ost.1.src.rpm

SHA-256: 51456f43e341dd3a6c3a6e48131cf1bbf10f5346e9f990399ace659569abae51

ppc64le

python-django20-bash-completion-2.0.13-16.el8ost.1.noarch.rpm

SHA-256: 5b0d41432aa6bfb632e05c4f522daceccef724eca5a3ec1bc392ad97f5da932a

python3-django20-2.0.13-16.el8ost.1.noarch.rpm

SHA-256: c99202f3c634f517ec9bbe5532da859c74185342baaf4bcab8a859bdfc5fd904

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update