CVE-2021-31542 log

Source
Severity Low
Remote Yes
Type Directory traversal
Description
A security issue has been found in Django before version 3.2.1. MultiPartParser, UploadedFile, and FieldFile allowed directory-traversal via uploaded files with suitably crafted file names. In order to mitigate this risk, stricter basename and path sanitation is now applied. Specifically, empty file names and paths with dot segments will be rejected.
Group Package Affected Fixed Severity Status Ticket
AVG-1910 python-django 3.2-1 3.2.1-1 Low Fixed
References
https://www.djangoproject.com/weblog/2021/may/04/security-releases/
https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007