Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.800924
Category:Web application abuses
Title:Django Directory Traversal Vulnerability - Linux
Summary:Django is prone to a directory traversal vulnerability.
Description:Summary:
Django is prone to a directory traversal vulnerability.

Vulnerability Insight:
Admin media handler in core/servers/basehttp.py does not properly map
URL requests to expected 'static media files, ' caused via a carefully-crafted URL which can cause the
development server to serve any file to which it has read access.

Vulnerability Impact:
Successful exploitation will let the attacker launch directory traversal
attack and read arbitrary files via crafted URLs.

Affected Software/OS:
Django 0.96 before 0.96.4 and 1.0 before 1.0.3 on Linux.

Solution:
Upgrade to Django 0.96.4 or 1.0.3 later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-2659
BugTraq ID: 35859
http://www.securityfocus.com/bid/35859
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00055.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00069.html
http://www.openwall.com/lists/oss-security/2009/07/29/2
http://secunia.com/advisories/36137
http://secunia.com/advisories/36153
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.