Hide Forgot
A flaw was found in django. ``MultiPartParser``, ``UploadedFile``, and ``FieldFile`` allowed directory-traversal via uploaded files with suitably crafted file names.
Upstream fixes: [main branch] https://github.com/django/django/commit/0b79eb36915d178aef5c6a7bbce71b1e76d376d3 [3.2 branch] https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007 [3.1 branch] https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48 [2.2 branch] https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d
External References: https://www.djangoproject.com/weblog/2021/may/04/security-releases/
Statement: Red Hat Update Infrastructure is in the maintenance phase and we will not be fixing Medium/Low impact security bugs. Reference: https://access.redhat.com/support/policy/updates/rhui
Created django:1.6/python-django tracking bugs for this issue: Affects: fedora-all [bug 1961136] Created python-django tracking bugs for this issue: Affects: epel-all [bug 1961137] Affects: fedora-all [bug 1961135] Affects: openstack-rdo [bug 1961138]
Analysis is complete for AAP 1.2 and Ansible Tower. Below are my observations: > The PulpCore component of AAP 1.2 is found to be using the affected Libs/Functionalities i.e. UploadedFile. Also, AAP 1.2 as a whole affected to this vulnerability as its using affected version of Django i.e. django-2.2.16. Hence, marking it as "Affected". -> manifest.txt:ansible_automation_platform:1.2::el7/django-2.2.16 > When it comes to Tower, though its using the affected Django version i.e. django-2.2.11, None of the vulnerable Libs/Functions are being used in Tower. Hence, marking it as "Not Affected".
This issue has been addressed in the following products: Red Hat Satellite 6.10 for RHEL 7 Via RHSA-2021:4702 https://access.redhat.com/errata/RHSA-2021:4702
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.1 Via RHSA-2021:5070 https://access.redhat.com/errata/RHSA-2021:5070
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-31542