Vulnerability Name: | CVE-2013-4315 (CCN-87056) | ||||||||||||||||
Assigned: | 2013-09-11 | ||||||||||||||||
Published: | 2013-09-11 | ||||||||||||||||
Updated: | 2013-12-10 | ||||||||||||||||
Summary: | Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag. | ||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-22 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-4315 Source: SUSE Type: UNKNOWN openSUSE-SU-2013:1541 Source: REDHAT Type: UNKNOWN RHSA-2013:1521 Source: CCN Type: SA54772 Django "ssi" Template Tag Arbitrary File Disclosure Vulnerability Source: SECUNIA Type: Vendor Advisory 54772 Source: SECUNIA Type: Vendor Advisory 54828 Source: DEBIAN Type: UNKNOWN DSA-2755 Source: CCN Type: BID-62332 Django CVE-2013-4315 Directory Traversal Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1004969 (CVE-2013-4315) CVE-2013-4315 python-django: directory traversal with ssi template tag Source: XF Type: UNKNOWN django-cve20134315-directory-traversal(87056) Source: CCN Type: Django Web Site Django Source: CONFIRM Type: Patch, Vendor Advisory https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2013-4315 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |