You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
CVE-2016-9013 - High Severity Vulnerability
Vulnerable Library - Django-1.9.6-py2.py3-none-any.whl
A high-level Python Web framework that encourages rapid development and clean, pragmatic design.
path: /example-python
Library home page: https://pypi.python.org/packages/cb/97/081df31f2a3850988b92ad4464e95f9e4b257aa5a34e120bca89c260de96/Django-1.9.6-py2.py3-none-any.whl
Dependency Hierarchy:
Vulnerability Details
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
Publish Date: 2016-12-09
URL: CVE-2016-9013
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1037159
Release Date: 2017-12-31
Fix Resolution: The vendor has issued a fix (1.8.16, 1.9.11, 1.10.3).
The vendor advisory is available at:
https://www.djangoproject.com/weblog/2016/nov/01/security-releases/
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: