django is vulnerable to directory traversal. The vulnerability exists due to the lack of path and file name sanitization for files uploaded, allowing a remote attacker to upload a file in arbitrary locations on the file system.
www.openwall.com/lists/oss-security/2021/05/04/3
django.readthedocs.io/en/latest/releases/security.html#may-4-2021-cve-2021-31542
docs.djangoproject.com/en/3.2/releases/security/
github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d
github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48
github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007
groups.google.com/forum/#!forum/django-announce
lists.debian.org/debian-lts-announce/2021/05/msg00005.html
lists.fedoraproject.org/archives/list/[email protected]/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
lists.fedoraproject.org/archives/list/[email protected]/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/
security.netapp.com/advisory/ntap-20210618-0001/
www.djangoproject.com/weblog/2021/may/04/security-releases/