In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0065 | In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. |
Github GHSA |
GHSA-qm57-vhq3-3fwf | Header injection possible in Django |
Ubuntu USN |
USN-4975-1 | Django vulnerabilities |
Ubuntu USN |
USN-5373-1 | Django vulnerabilities |
Ubuntu USN |
USN-5373-2 | Django vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:17:28.409Z
Reserved: 2021-05-05T00:00:00
Link: CVE-2021-32052
No data.
Status : Modified
Published: 2021-05-06T16:15:07.520
Modified: 2024-11-21T06:06:46.180
Link: CVE-2021-32052
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN