Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.
2013-09-16T19:14:39.303
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | djangoproject | django | 1.4 | Yes |
| Application | djangoproject | django | 1.4.1 | Yes |
| Application | djangoproject | django | 1.4.2 | Yes |
| Application | djangoproject | django | 1.4.4 | Yes |
| Application | djangoproject | django | 1.4.5 | Yes |
| Application | djangoproject | django | 1.4.6 | Yes |
| Application | djangoproject | django | 1.5 | Yes |
| Application | djangoproject | django | 1.5 | Yes |
| Application | djangoproject | django | 1.5 | Yes |
| Application | djangoproject | django | 1.5.1 | Yes |
| Application | djangoproject | django | 1.6 | Yes |
| Application | djangoproject | django | 1.6 | Yes |