CVE-2020-24584

An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
References
Link Resource
https://docs.djangoproject.com/en/dev/releases/security/ Vendor Advisory
https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM
https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
https://security.netapp.com/advisory/ntap-20200918-0004/ Third Party Advisory
https://usn.ubuntu.com/4479-1/ Third Party Advisory
https://www.djangoproject.com/weblog/2020/sep/01/security-releases/ Vendor Advisory
https://www.openwall.com/lists/oss-security/2020/09/01/2 Mailing List Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Patch Third Party Advisory
https://docs.djangoproject.com/en/dev/releases/security/ Vendor Advisory
https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM
https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
https://security.netapp.com/advisory/ntap-20200918-0004/ Third Party Advisory
https://usn.ubuntu.com/4479-1/ Third Party Advisory
https://www.djangoproject.com/weblog/2020/sep/01/security-releases/ Vendor Advisory
https://www.openwall.com/lists/oss-security/2020/09/01/2 Mailing List Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-01 13:15

Updated : 2024-11-21 05:15


NVD link : CVE-2020-24584

Mitre link : CVE-2020-24584

CVE.ORG link : CVE-2020-24584


JSON object : View

Products Affected

djangoproject

  • django

fedoraproject

  • fedora

oracle

  • zfs_storage_appliance_kit

canonical

  • ubuntu_linux
CWE
CWE-276

Incorrect Default Permissions