Search for vulnerabilities
Vulnerability details: VCID-he7b-33hj-aaab
Vulnerability ID VCID-he7b-33hj-aaab
Aliases BIT-2021-33571
BIT-django-2021-33571
CVE-2021-33571
GHSA-p99v-5w3c-jqq9
PYSEC-2021-99
Summary In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33571.html
rhas Moderate https://access.redhat.com/errata/RHSA-2021:3490
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4702
rhas Moderate https://access.redhat.com/errata/RHSA-2021:5070
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33571.json
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
epss 0.00190 https://api.first.org/data/v1/epss?cve=CVE-2021-33571
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1966253
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33571
cvssv3.1 7.3 https://docs.djangoproject.com/en/3.2/releases/security
generic_textual HIGH https://docs.djangoproject.com/en/3.2/releases/security
generic_textual Medium https://docs.djangoproject.com/en/3.2/releases/security/
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-p99v-5w3c-jqq9
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.5 https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
generic_textual HIGH https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
cvssv3.1 7.5 https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
generic_textual HIGH https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
cvssv3.1 7.5 https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
generic_textual HIGH https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-99.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-99.yaml
cvssv3.1 7.5 https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
generic_textual HIGH https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2021-33571
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-33571
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-33571
archlinux Medium https://security.archlinux.org/AVG-2026
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20210727-0004
generic_textual HIGH https://security.netapp.com/advisory/ntap-20210727-0004
generic_textual Medium https://ubuntu.com/security/notices/USN-4975-1
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2021/jun/02/security-releases
generic_textual HIGH https://www.djangoproject.com/weblog/2021/jun/02/security-releases
generic_textual Medium https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33571.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33571.json
https://api.first.org/data/v1/epss?cve=CVE-2021-33571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33571
https://docs.djangoproject.com/en/3.2/releases/security
https://docs.djangoproject.com/en/3.2/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-99.yaml
https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
https://security.netapp.com/advisory/ntap-20210727-0004
https://security.netapp.com/advisory/ntap-20210727-0004/
https://ubuntu.com/security/notices/USN-4975-1
https://www.djangoproject.com/weblog/2021/jun/02/security-releases
https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
1966253 https://bugzilla.redhat.com/show_bug.cgi?id=1966253
989394 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989394
ASA-202106-41 https://security.archlinux.org/ASA-202106-41
AVG-2026 https://security.archlinux.org/AVG-2026
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
CVE-2021-33571 https://nvd.nist.gov/vuln/detail/CVE-2021-33571
GHSA-p99v-5w3c-jqq9 https://github.com/advisories/GHSA-p99v-5w3c-jqq9
RHSA-2021:3490 https://access.redhat.com/errata/RHSA-2021:3490
RHSA-2021:4702 https://access.redhat.com/errata/RHSA-2021:4702
RHSA-2021:5070 https://access.redhat.com/errata/RHSA-2021:5070
USN-4975-1 https://usn.ubuntu.com/4975-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33571.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://docs.djangoproject.com/en/3.2/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-99.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-33571
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-33571
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-33571
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://security.netapp.com/advisory/ntap-20210727-0004
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.djangoproject.com/weblog/2021/jun/02/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.00742
EPSS Score 0.00012
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.