Lucene search

K
mageiaGentoo FoundationMGASA-2013-0283
HistorySep 19, 2013 - 1:41 p.m.

Updated python-django package fixes security vulnerability

2013-09-1913:41:40
Gentoo Foundation
advisories.mageia.org
44

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

77.3%

Rainer Koirikivi discovered a directory traversal vulnerability with โ€˜ssiโ€™ template tags in python-django, a high-level Python web development framework. It was shown that the handling of the โ€˜ALLOWED_INCLUDE_ROOTSโ€™ setting, used to represent allowed prefixes for the {% ssi %} template tag, is vulnerable to a directory traversal attack, by specifying a file path which begins as the absolute path of a directory in โ€˜ALLOWED_INCLUDE_ROOTSโ€™, and then uses relative paths to break free. To exploit this vulnerability an attacker must be in a position to alter templates on the site, or the site to be attacked must have one or more templates making use of the โ€˜ssiโ€™ tag, and must allow some form of unsanitized user input to be used as an argument to the โ€˜ssiโ€™ tag (CVE-2013-4315).

OSVersionArchitecturePackageVersionFilename
Mageia2noarchpython-django<ย 1.3.7-1.2python-django-1.3.7-1.2.mga2

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

77.3%