Directory Traversal Affecting python-django package, versions <1.1-1
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.63% (79th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-PYTHONDJANGO-530568
- published 4 Aug 2009
- disclosed 4 Aug 2009
How to fix?
Upgrade Debian:11
python-django
to version 1.1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-django
package and not the python-django
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected "static media files," which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL.
References
- https://security-tracker.debian.org/tracker/CVE-2009-2659
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539134
- http://code.djangoproject.com/changeset/11353
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00055.html
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00069.html
- http://www.djangoproject.com/weblog/2009/jul/28/security/
- http://www.openwall.com/lists/oss-security/2009/07/29/2
- http://secunia.com/advisories/36137
- http://secunia.com/advisories/36153
- http://www.securityfocus.com/bid/35859