MGASA-2013-0283

Source
https://advisories.mageia.org/MGASA-2013-0283.html
Import Source
https://advisories.mageia.org/MGASA-2013-0283.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0283
Related
Published
2013-09-19T09:41:40Z
Modified
2013-09-19T09:41:35Z
Summary
Updated python-django package fixes security vulnerability
Details

Rainer Koirikivi discovered a directory traversal vulnerability with 'ssi' template tags in python-django, a high-level Python web development framework. It was shown that the handling of the 'ALLOWEDINCLUDEROOTS' setting, used to represent allowed prefixes for the {% ssi %} template tag, is vulnerable to a directory traversal attack, by specifying a file path which begins as the absolute path of a directory in 'ALLOWEDINCLUDEROOTS', and then uses relative paths to break free. To exploit this vulnerability an attacker must be in a position to alter templates on the site, or the site to be attacked must have one or more templates making use of the 'ssi' tag, and must allow some form of unsanitized user input to be used as an argument to the 'ssi' tag (CVE-2013-4315).

References
Credits

Affected packages

Mageia:2 / python-django

Package

Name
python-django
Purl
pkg:rpm/mageia/python-django?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.7-1.2.mga2

Ecosystem specific

{
    "section": "core"
}