Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9013

Опубликовано: 09 дек. 2016
Источник: debian
EPSS Низкий

Описание

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed1:1.10.3-1package
python-djangono-dsawheezypackage

Примечания

  • https://www.djangoproject.com/weblog/2016/nov/01/security-releases/

  • https://github.com/django/django/commit/da7910d4834726eca596af0a830762fa5fb2dfd9

EPSS

Процентиль: 85%
0.02395
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 7.4
redhat
около 9 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 9.8
nvd
около 9 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 9.8
github
больше 3 лет назад

Django user with hardcoded password created when running tests on Oracle

suse-cvrf
больше 7 лет назад

Security update for python-Django

EPSS

Процентиль: 85%
0.02395
Низкий