Headline
RHSA-2021:5070: Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-django20) security update
An update for python-django20 is now available for Red Hat OpenStack Platform 16.1 (Train). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-3281: django: Potential directory-traversal via archive.extract()
- CVE-2021-28658: django: potential directory-traversal via uploaded files
- CVE-2021-31542: django: Potential directory-traversal via uploaded files
- CVE-2021-33203: django: Potential directory traversal via
admindocs - CVE-2021-33571: django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat Openshift Container Storage
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
- Red Hat CodeReady Studio
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2021-12-09
Updated:
2021-12-09
RHSA-2021:5070 - Security Advisory
- Overview
- Updated Packages
Synopsis
Moderate: Red Hat OpenStack Platform 16.1 (python-django20) security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for python-django20 is now available for Red Hat OpenStack
Platform 16.1 (Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Description
Security Fix(es):
- Potential directory-traversal via archive.extract() (CVE-2021-3281)
- potential directory-traversal via uploaded files (CVE-2021-28658)
- Potential directory-traversal via uploaded files (CVE-2021-31542)
- Potential directory traversal via ``admindocs`` (CVE-2021-33203)
- Possible indeterminate SSRF RFI and LFI attacks since validators accepted
leading zeros in IPv4 addresses (CVE-2021-33571)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Affected Products
- Red Hat OpenStack 16.1 x86_64
- Red Hat OpenStack for IBM Power 16.1 ppc64le
Fixes
- BZ - 1919969 - CVE-2021-3281 django: Potential directory-traversal via archive.extract()
- BZ - 1944801 - CVE-2021-28658 django: potential directory-traversal via uploaded files
- BZ - 1954294 - CVE-2021-31542 django: Potential directory-traversal via uploaded files
- BZ - 1966251 - CVE-2021-33203 django: Potential directory traversal via ``admindocs``
- BZ - 1966253 - CVE-2021-33571 django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
CVEs
- CVE-2021-3281
- CVE-2021-28658
- CVE-2021-31542
- CVE-2021-33203
- CVE-2021-33571
Red Hat OpenStack 16.1
SRPM
python-django20-2.0.13-16.el8ost.1.src.rpm
SHA-256: 51456f43e341dd3a6c3a6e48131cf1bbf10f5346e9f990399ace659569abae51
x86_64
python-django20-bash-completion-2.0.13-16.el8ost.1.noarch.rpm
SHA-256: 5b0d41432aa6bfb632e05c4f522daceccef724eca5a3ec1bc392ad97f5da932a
python3-django20-2.0.13-16.el8ost.1.noarch.rpm
SHA-256: c99202f3c634f517ec9bbe5532da859c74185342baaf4bcab8a859bdfc5fd904
Red Hat OpenStack for IBM Power 16.1
SRPM
python-django20-2.0.13-16.el8ost.1.src.rpm
SHA-256: 51456f43e341dd3a6c3a6e48131cf1bbf10f5346e9f990399ace659569abae51
ppc64le
python-django20-bash-completion-2.0.13-16.el8ost.1.noarch.rpm
SHA-256: 5b0d41432aa6bfb632e05c4f522daceccef724eca5a3ec1bc392ad97f5da932a
python3-django20-2.0.13-16.el8ost.1.noarch.rpm
SHA-256: c99202f3c634f517ec9bbe5532da859c74185342baaf4bcab8a859bdfc5fd904
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.