{"id":"CVE-2021-44420","details":"In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.","aliases":["BIT-django-2021-44420","GHSA-v6rh-hp5x-86rv","PYSEC-2021-439"],"modified":"2026-04-16T04:34:20.728522806Z","published":"2021-12-08T00:15:07.757Z","related":["openSUSE-SU-2023:0005-1","openSUSE-SU-2024:11791-1","openSUSE-SU-2025:14702-1"],"references":[{"type":"WEB","url":"https://groups.google.com/forum/#%21forum/django-announce"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20211229-0006/"},{"type":"FIX","url":"https://www.djangoproject.com/weblog/2021/dec/07/security-releases/"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2021/12/07/1"},{"type":"FIX","url":"https://docs.djangoproject.com/en/3.2/releases/security/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"2a62cdcfec85938f40abb2e9e6a9ff497e02afe8"},{"fixed":"79d8dcefb2739176839fa76f8780aca5aa9b7101"},{"introduced":"0b8a0296bfd30748f08021834e95cdae241686e8"},{"fixed":"840bebf1eef1c2a373158262cdfec611dc535658"},{"introduced":"3591e1c1acbd7c13174275367c3fdf012cb0413b"},{"fixed":"0153a63a674937e4a56d9d5e4ca2d629b011fbde"},{"introduced":"0"},{"last_affected":"36b5f39d9372147f0e758f590e35ee2b2bc317dd"}],"database_specific":{"versions":[{"introduced":"2.2"},{"fixed":"2.2.25"},{"introduced":"3.1"},{"fixed":"3.1.14"},{"introduced":"3.2"},{"fixed":"3.2.10"},{"introduced":"0"},{"last_affected":"6.0"}]}}],"versions":["1.0","1.1","1.2","1.2.1","1.3","1.4","1.7a2","2.2","2.2.1","2.2.10","2.2.11","2.2.12","2.2.13","2.2.14","2.2.15","2.2.16","2.2.17","2.2.18","2.2.19","2.2.2","2.2.20","2.2.21","2.2.22","2.2.23","2.2.24","2.2.3","2.2.4","2.2.5","2.2.6","2.2.7","2.2.8","2.2.9","2.2a1","2.2b1","2.2rc1","3.1","3.1.1","3.1.10","3.1.11","3.1.12","3.1.13","3.1.2","3.1.3","3.1.4","3.1.5","3.1.6","3.1.7","3.1.8","3.1.9","3.1a1","3.1b1","3.1rc1","3.2","3.2.1","3.2.2","3.2.3","3.2.4","3.2.5","3.2.6","3.2.7","3.2.8","3.2.9","3.2a1","3.2b1","3.2rc1","6.0","6.0a1","6.0b1","6.0rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-44420.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"21.04"}]},{"events":[{"introduced":"0"},{"last_affected":"21.10"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}