CVE-2011-0698: Directory traversal in Django
(updated )
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
References
- github.com/advisories/GHSA-7g9h-c88w-r7h2
- github.com/django/django
- github.com/django/django/commit/194566480b15cf4e294d3f03ff587019b74044b2
- github.com/django/django/commit/570a32a047ea56265646217264b0d3dab1a14dbd
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2011-12.yaml
- nvd.nist.gov/vuln/detail/CVE-2011-0698
- web.archive.org/web/20110521033259/http://secunia.com/advisories/43230
- web.archive.org/web/20130616104703/http://www.securityfocus.com/bid/46296
Detect and mitigate CVE-2011-0698 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →