5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.007 Low
EPSS
Percentile
80.3%
Package : python-django
Version : 1.2.3-3+squeeze15
CVE ID : CVE-2015-8213
It was discovered that there was a potential settings leak in date
template filter of Django, a web-development framework.
If an application allows users to specify an unvalidated format for
dates and passes this format to the date filter, e.g.
{{ last_updated|date:user_date_format }}, then a malicious user
could obtain any secret in the application's settings by specifying
a settings key instead of a date format. e.g. "SECRET_KEY" instead
of "j/m/Y".
To remedy this, the underlying function used by the date template
filter, django.utils.formats.get_format(), now only allows accessing
the date/time formatting settings.
For Debian 6 Squeeze, this issue has been fixed in python-django
version 1.2.3-3+squeeze15.
Regards,
,''`.
: :' : Chris Lamb
`. `'` [email protected] / chris-lamb.co.uk
`-
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | python-django | < 1.4.5-1+deb7u14 | python-django_1.4.5-1+deb7u14_all.deb |
Debian | 7 | all | python-django-doc | < 1.4.5-1+deb7u14 | python-django-doc_1.4.5-1+deb7u14_all.deb |
Debian | 8 | all | python3-django | < 1.7.7-1+deb8u3 | python3-django_1.7.7-1+deb8u3_all.deb |
Debian | 6 | all | python-django-doc | < 1.2.3-3+squeeze15 | python-django-doc_1.2.3-3+squeeze15_all.deb |
Debian | 6 | all | python-django | < 1.2.3-3+squeeze15 | python-django_1.2.3-3+squeeze15_all.deb |
Debian | 8 | all | python-django | < 1.7.7-1+deb8u3 | python-django_1.7.7-1+deb8u3_all.deb |
Debian | 8 | all | python-django-doc | < 1.7.7-1+deb8u3 | python-django-doc_1.7.7-1+deb8u3_all.deb |
Debian | 8 | all | python-django-common | < 1.7.7-1+deb8u3 | python-django-common_1.7.7-1+deb8u3_all.deb |