mirror of
https://github.com/django/django.git
synced 2025-11-07 07:15:35 +00:00
Fixed CVE-2025-59682 -- Fixed potential partial directory-traversal via archive.extract().
Thanks stackered for the report.
Follow up to 05413afa8c.
This commit is contained in:
@@ -15,3 +15,11 @@ CVE-2025-59681: Potential SQL injection in ``QuerySet.annotate()``, ``alias()``,
|
||||
to SQL injection in column aliases, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to these methods (follow up to
|
||||
:cve:`2022-28346`).
|
||||
|
||||
CVE-2025-59682: Potential partial directory-traversal via ``archive.extract()``
|
||||
===============================================================================
|
||||
|
||||
The ``django.utils.archive.extract()`` function, used by
|
||||
:option:`startapp --template` and :option:`startproject --template`, allowed
|
||||
partial directory-traversal via an archive with file paths sharing a common
|
||||
prefix with the target directory (follow up to :cve:`2021-3281`).
|
||||
|
||||
@@ -15,3 +15,11 @@ CVE-2025-59681: Potential SQL injection in ``QuerySet.annotate()``, ``alias()``,
|
||||
to SQL injection in column aliases, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to these methods (follow up to
|
||||
:cve:`2022-28346`).
|
||||
|
||||
CVE-2025-59682: Potential partial directory-traversal via ``archive.extract()``
|
||||
===============================================================================
|
||||
|
||||
The ``django.utils.archive.extract()`` function, used by
|
||||
:option:`startapp --template` and :option:`startproject --template`, allowed
|
||||
partial directory-traversal via an archive with file paths sharing a common
|
||||
prefix with the target directory (follow up to :cve:`2021-3281`).
|
||||
|
||||
@@ -17,6 +17,14 @@ to SQL injection in column aliases, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to these methods (follow up to
|
||||
:cve:`2022-28346`).
|
||||
|
||||
CVE-2025-59682: Potential partial directory-traversal via ``archive.extract()``
|
||||
===============================================================================
|
||||
|
||||
The ``django.utils.archive.extract()`` function, used by
|
||||
:option:`startapp --template` and :option:`startproject --template`, allowed
|
||||
partial directory-traversal via an archive with file paths sharing a common
|
||||
prefix with the target directory (follow up to :cve:`2021-3281`).
|
||||
|
||||
Bugfixes
|
||||
========
|
||||
|
||||
|
||||
Reference in New Issue
Block a user