Mandriva Linux Security Advisory : python-django (MDVSA-2013:234)

Medium Nessus Plugin ID 69892


The remote Mandriva Linux host is missing a security update.


A vulnerability has been discovered and corrected in python-django :

Rainer Koirikivi discovered a directory traversal vulnerability with 'ssi' template tags in python-django, a high-level Python web development framework. It was shown that the handling of the 'ALLOWED_INCLUDE_ROOTS' setting, used to represent allowed prefixes for the {% ssi %} template tag, is vulnerable to a directory traversal attack, by specifying a file path which begins as the absolute path of a directory in 'ALLOWED_INCLUDE_ROOTS', and then uses relative paths to break free. To exploit this vulnerability an attacker must be in a position to alter templates on the site, or the site to be attacked must have one or more templates making use of the 'ssi' tag, and must allow some form of unsanitized user input to be used as an argument to the 'ssi' tag (CVE-2013-4315).

The updated packages have been patched to correct this issue.


Update the affected python-django package.

Plugin Details

Severity: Medium

ID: 69892

File Name: mandriva_MDVSA-2013-234.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2013/09/14

Modified: 2013/11/25

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:python-django, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/09/13

Reference Information

CVE: CVE-2013-4315

BID: 62332

MDVSA: 2013:234