Описание
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.6.6-1 |
esm-infra-legacy/trusty | not-affected | 1.6.1-2ubuntu0.4 |
lucid | released | 1.1.1-2ubuntu1.13 |
precise | released | 1.3.1-4ubuntu1.12 |
trusty | released | 1.6.1-2ubuntu0.4 |
trusty/esm | not-affected | 1.6.1-2ubuntu0.4 |
upstream | released | 1.6.6-1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
The default configuration for the file upload handling system in Djang ...
EPSS
4.3 Medium
CVSS2