CVE-2015-8213: Django settings leak in date template filter
(updated )
The get_format function in utils/formats.py
in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY
.
References
- github.com/advisories/GHSA-6wcr-wcqm-3mfh
- github.com/django/django
- github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4
- github.com/django/django/commit/3ebbda0aef9e7a90ac6208bb8f9bc21228e2c7da
- github.com/django/django/commit/8a01c6b53169ee079cb21ac5919fdafcc8c5e172
- github.com/django/django/commit/9f83fc2f66f5a0bac7c291aec55df66050bb6991
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-11.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-8213
- www.djangoproject.com/weblog/2015/nov/24/security-releases-issued
Detect and mitigate CVE-2015-8213 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →