[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2755-1 python-django -- directory traversal

ID: oval:org.secpod.oval:def:601103Date: (C)2013-09-25   (M)2022-10-10
Class: PATCHFamily: unix




Rainer Koirikivi discovered a directory traversal vulnerability with "ssi" template tags in python-django, a high-level Python web development framework. It was shown that the handling of the "ALLOWED_INCLUDE_ROOTS" setting, used to represent allowed prefixes for the {% ssi %} template tag, is vulnerable to a directory traversal attack, by specifying a file path which begins as the absolute path of a directory in "ALLOWED_INCLUDE_ROOTS", and then uses relative paths to break free. To exploit this vulnerability an attacker must be in a position to alter templates on the site, or the site to be attacked must have one or more templates making use of the "ssi" tag, and must allow some form of unsanitized user input to be used as an argument to the "ssi" tag.

Platform:
Debian 7.0
Debian 6.0
Product:
python-django
Reference:
DSA-2755-1
CVE-2013-4315
CVE    1
CVE-2013-4315
CPE    3
cpe:/a:djangoproject:python-django
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0

© SecPod Technologies