Vulnerability CVE-2009-2659


Published: 2009-08-04   Modified: 2012-02-13

Description:
The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Django project -> Django 

 References:
http://www.djangoproject.com/weblog/2009/jul/28/security/
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00069.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00055.html
http://www.securityfocus.com/bid/35859
http://www.openwall.com/lists/oss-security/2009/07/29/2
http://secunia.com/advisories/36153
http://secunia.com/advisories/36137
http://code.djangoproject.com/changeset/11353
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539134

Copyright 2024, cxsecurity.com

 

Back to Top