Use of Hard-coded Credentials

Affecting python-django package, versions <1.8.7-1ubuntu5.4

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

NVD Description

Note: Versions mentioned in the description apply to the upstream python-django package. See Remediation section below for Ubuntu:16.04 relevant versions.

Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.

Remediation

Upgrade Ubuntu:16.04 python-django to version 1.8.7-1ubuntu5.4 or higher.

References

CVSS Score

9.8
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE
CVE-2016-9013
CWE
CWE-798
Snyk ID
SNYK-UBUNTU1604-PYTHONDJANGO-360974
Disclosed
09 Dec, 2016
Published
09 Dec, 2016