[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-4534Date: (C)2011-01-10   (M)2023-12-22


The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.0
Exploit Score: 8.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: SINGLE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
http://www.securityfocus.com/archive/1/515446
SECUNIA-42715
SECUNIA-42827
SECUNIA-42913
BID-45562
ADV-2011-0048
ADV-2011-0098
FEDORA-2011-0096
FEDORA-2011-0120
USN-1040-1
http://www.openwall.com/lists/oss-security/2010/12/23/4
http://www.openwall.com/lists/oss-security/2011/01/03/5
http://code.djangoproject.com/changeset/15031
http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/
http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/
http://www.djangoproject.com/weblog/2010/dec/22/security/
https://bugzilla.redhat.com/show_bug.cgi?id=665373

CPE    10
cpe:/a:djangoproject:django:1.0
cpe:/a:djangoproject:django:1.1
cpe:/a:djangoproject:django:1.2
cpe:/a:djangoproject:django:1.3:alpha1
...
CWE    1
CWE-264
OVAL    3
oval:org.secpod.oval:def:101191
oval:org.secpod.oval:def:700219
oval:org.secpod.oval:def:101174

© SecPod Technologies