CVE-2021-32052 - log back

CVE-2021-32052 edited at 06 May 2021 17:48:44
Description
+ In Django before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
- On Python 3.9.5+, URLValidator didn't prohibit newlines and tabs. If you used values with newlines in HTTP response, you could suffer from header injection attacks. Django itself wasn't vulnerable because HttpResponse prohibits newlines in HTTP headers.
-
- Moreover, the URLField form field which uses URLValidator silently removes newlines and tabs on Python 3.9.5+, so the possibility of newlines entering your data only existed if you are using this validator outside of the form fields.
-
- The issue is fixed in Django version 3.2.2.
CVE-2021-32052 edited at 06 May 2021 08:27:35
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Url request injection
Description
+ On Python 3.9.5+, URLValidator didn't prohibit newlines and tabs. If you used values with newlines in HTTP response, you could suffer from header injection attacks. Django itself wasn't vulnerable because HttpResponse prohibits newlines in HTTP headers.
+
+ Moreover, the URLField form field which uses URLValidator silently removes newlines and tabs on Python 3.9.5+, so the possibility of newlines entering your data only existed if you are using this validator outside of the form fields.
+
+ The issue is fixed in Django version 3.2.2.
References
+ https://www.djangoproject.com/weblog/2021/may/06/security-releases/
+ https://github.com/django/django/commit/2d2c1d0c97832860fbd6597977e2aae17dd7e5b2
Notes
CVE-2021-32052 created at 06 May 2021 08:23:57