Vulnerability Name: | CVE-2011-0698 (CCN-65334) | ||||||||
Assigned: | 2011-02-08 | ||||||||
Published: | 2011-02-08 | ||||||||
Updated: | 2011-02-23 | ||||||||
Summary: | Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-22 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2011-0698 Source: MLIST Type: Patch [oss-security] 20110209 Django multiple flaws (CVEs inside) Source: CCN Type: SA43230 Django Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 43230 Source: CCN Type: Django Web site Security releases issued Source: CONFIRM Type: Patch, Vendor Advisory http://www.djangoproject.com/weblog/2011/feb/08/security/ Source: MANDRIVA Type: UNKNOWN MDVSA-2011:031 Source: CCN Type: OSVDB ID: 71001 Django Session Cookie / Character Traversal Arbitrary File Access Source: BID Type: UNKNOWN 46296 Source: CCN Type: BID-46296 Django Multiple Remote Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2011-0372 Source: VUPEN Type: UNKNOWN ADV-2011-0439 Source: XF Type: UNKNOWN django-sessionstorage-dir-tarversal(65334) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||
BACK |