7.3
CVSSv3

CVE-2021-44420

Published: 08/12/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 7.3 | Impact Score: 3.4 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Django 2.2 prior to 2.2.25, 3.1 prior to 3.1.14, and 3.2 prior to 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

djangoproject django

redhat satellite 6.0

debian debian linux 10.0

debian debian linux 11.0

canonical ubuntu linux 20.04

canonical ubuntu linux 21.04

canonical ubuntu linux 21.10

fedoraproject fedora 35

Vendor Advisories

Synopsis Low: RHUI 430 release - Security Fixes, Bug Fixes, and Enhancements Update Type/Severity Security Advisory: Low Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An updated version of Red Hat Update Infrastructure (RHUI) is now available RHUI 43 fixes a ...
Synopsis Moderate: Satellite 611 Release Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update is now available for Red Hat Satellite 611 Description Red Hat Satellite is a systems management tool for Linux-basedin ...
A security issue has been found in Django before version 3210 HTTP requests for URLs with trailing newlines could bypass an upstream access control based on URL paths ...