Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9013

Опубликовано: 09 дек. 2016
Источник: debian
EPSS Низкий

Описание

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed1:1.10.3-1package
python-djangono-dsawheezypackage

Примечания

  • https://www.djangoproject.com/weblog/2016/nov/01/security-releases/

  • https://github.com/django/django/commit/da7910d4834726eca596af0a830762fa5fb2dfd9

EPSS

Процентиль: 77%
0.01045
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 7.4
redhat
больше 8 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 9.8
nvd
больше 8 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 9.8
github
около 3 лет назад

Django user with hardcoded password created when running tests on Oracle

suse-cvrf
около 7 лет назад

Security update for python-Django

EPSS

Процентиль: 77%
0.01045
Низкий