mirror of
https://github.com/django/django.git
synced 2025-10-24 14:16:09 +00:00
[5.1.x] Fixed CVE-2024-39330 -- Added extra file name validation in Storage's save method.
Thanks to Josh Schneier for the report, and to Carlton Gibson and Sarah Boyce for the reviews.
This commit is contained in:
@@ -20,3 +20,15 @@ CVE-2024-39329: Username enumeration through timing difference for users with un
|
||||
The :meth:`~django.contrib.auth.backends.ModelBackend.authenticate()` method
|
||||
allowed remote attackers to enumerate users via a timing attack involving login
|
||||
requests for users with unusable passwords.
|
||||
|
||||
CVE-2024-39330: Potential directory-traversal via ``Storage.save()``
|
||||
====================================================================
|
||||
|
||||
Derived classes of the :class:`~django.core.files.storage.Storage` base class
|
||||
which override :meth:`generate_filename()
|
||||
<django.core.files.storage.Storage.generate_filename()>` without replicating
|
||||
the file path validations existing in the parent class, allowed for potential
|
||||
directory-traversal via certain inputs when calling :meth:`save()
|
||||
<django.core.files.storage.Storage.save()>`.
|
||||
|
||||
Built-in ``Storage`` sub-classes were not affected by this vulnerability.
|
||||
|
||||
@@ -21,6 +21,18 @@ The :meth:`~django.contrib.auth.backends.ModelBackend.authenticate()` method
|
||||
allowed remote attackers to enumerate users via a timing attack involving login
|
||||
requests for users with unusable passwords.
|
||||
|
||||
CVE-2024-39330: Potential directory-traversal via ``Storage.save()``
|
||||
====================================================================
|
||||
|
||||
Derived classes of the :class:`~django.core.files.storage.Storage` base class
|
||||
which override :meth:`generate_filename()
|
||||
<django.core.files.storage.Storage.generate_filename()>` without replicating
|
||||
the file path validations existing in the parent class, allowed for potential
|
||||
directory-traversal via certain inputs when calling :meth:`save()
|
||||
<django.core.files.storage.Storage.save()>`.
|
||||
|
||||
Built-in ``Storage`` sub-classes were not affected by this vulnerability.
|
||||
|
||||
Bugfixes
|
||||
========
|
||||
|
||||
|
||||
Reference in New Issue
Block a user