LWN.net Logo

Advertisement

GStreamer, Embedded Linux, Android, VoD, Smooth Streaming, DRM, RTSP, HEVC, PulseAudio, OpenGL. Register now to attend.

Advertise here

python-django: directory traversal

Package(s):python-django CVE #(s):CVE-2013-4315
Created:September 11, 2013 Updated:September 19, 2013
Description: From the Debian advisory:

Rainer Koirikivi discovered a directory traversal vulnerability with 'ssi' template tags in python-django, a high-level Python web development framework.

It was shown that the handling of the 'ALLOWED_INCLUDE_ROOTS' setting, used to represent allowed prefixes for the {% ssi %} template tag, is vulnerable to a directory traversal attack, by specifying a file path which begins as the absolute path of a directory in 'ALLOWED_INCLUDE_ROOTS', and then uses relative paths to break free.

To exploit this vulnerability an attacker must be in a position to alter templates on the site, or the site to be attacked must have one or more templates making use of the 'ssi' tag, and must allow some form of unsanitized user input to be used as an argument to the 'ssi' tag.

Alerts:
Debian DSA-2755-1 2013-09-11
Mandriva MDVSA-2013:234 2013-09-13
Mageia MGASA-2013-0283 2013-09-19
Mageia MGASA-2013-0284 2013-09-19
Fedora FEDORA-2013-16901 2013-09-24
Fedora FEDORA-2013-16899 2013-09-24
Ubuntu USN-1967-1 2013-09-24

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds