Bug 844202 (CVE-2013-4315) - VUL-0: CVE-2013-4315: python-django: directory traversal
Summary: VUL-0: CVE-2013-4315: python-django: directory traversal
Status: RESOLVED FIXED
Alias: CVE-2013-4315
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Sascha Peilicke
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-10-06 17:35 UTC by Marcus Meissner
Modified: 2013-11-28 12:50 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2013-10-06 17:35:59 UTC
CVE-2013-4315

Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before
1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary
files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot
dot) in a ssi template tag.

References:
http://secunia.com/advisories/54772
http://secunia.com/advisories/54828
http://www.debian.org/security/2013/dsa-2755
https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4315
https://bugzilla.redhat.com/show_bug.cgi?id=1004969
Comment 1 Swamp Workflow Management 2013-10-11 07:40:39 UTC
bugbot adjusting priority
Comment 2 Vincent Untz 2013-11-21 14:46:04 UTC
Sascha: here are the latest security issues we have.
Comment 3 Vincent Untz 2013-11-21 14:48:17 UTC
AFAICT, we have 1.4.8 in the update channel, so we should be safe?
Comment 4 Sascha Peilicke 2013-11-28 12:50:19 UTC
Yes. For Cloud-3 we submitted 1.5.4, which is ok too.