Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mv8g-fhh6-6267

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

Django user with hardcoded password created when running tests on Oracle

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

Пакеты

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 1.10a1, < 1.10.3

1.10.3

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 1.9a1, < 1.9.11

1.9.11

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 1.8a1, < 1.8.16

1.8.16

EPSS

Процентиль: 76%
0.01045
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 7.4
redhat
больше 8 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 9.8
nvd
больше 8 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

CVSS3: 9.8
debian
больше 8 лет назад

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.1 ...

suse-cvrf
около 7 лет назад

Security update for python-Django

EPSS

Процентиль: 76%
0.01045
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-798