7.5
CVSSv3

CVE-2021-33571

Published: 08/06/2021 Updated: 07/12/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

In Django 2.2 prior to 2.2.24, 3.x prior to 3.1.12, and 3.2 prior to 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

djangoproject django

fedoraproject fedora 35

Vendor Advisories

Debian Bug report logs - #989394 python-django: CVE-2021-33203 & CVE-2021-33571 Package: python-django; Maintainer for python-django is Debian Python Team <team+python@trackerdebianorg>; Source for python-django is src:python-django (PTS, buildd, popcon) Reported by: "Chris Lamb" <lamby@debianorg> Date: Wed, ...
A flaw was found in django Leading zeros in octal literals aren't prohibited in IP addresses If you used such values you could suffer from indeterminate SSRF, RFI, and LFI attacks The highest threat from this vulnerability is to data integrity ...
A security issue has been found in Django before version 324 URLValidator, validate_ipv4_address(), and validate_ipv46_address() didn't prohibit leading zeros in octal literals If you used such values you could suffer from indeterminate SSRF, RFI, and LFI attacks validate_ipv4_address() and validate_ipv46_address() validators were not affected ...