ASA-202102-18 log generated external raw

[ASA-202102-18] python-django: directory traversal
Arch Linux Security Advisory ASA-202102-18 ========================================== Severity: Low Date : 2021-02-07 CVE-ID : CVE-2021-3281 Package : python-django Type : directory traversal Remote : No Link : Summary ======= The package python-django before version 3.1.6-1 is vulnerable to directory traversal. Resolution ========== Upgrade to 3.1.6-1. # pacman -Syu "python-django>=3.1.6-1" The problem has been fixed upstream in version 3.1.6. Workaround ========== None. Description =========== In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. Impact ====== An attacker might be able to write files in arbitrary file system locations by tricking the user to select a crafted template file that leads to directory traversal. References ==========