4

CVE-2010-4534

Exploit

The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DjangoprojectDjango Version <= 1.1.2
DjangoprojectDjango Version0.91
DjangoprojectDjango Version0.95
DjangoprojectDjango Version0.95.1
DjangoprojectDjango Version0.96
DjangoprojectDjango Version1.0
DjangoprojectDjango Version1.0.1
DjangoprojectDjango Version1.0.2
DjangoprojectDjango Version1.1
DjangoprojectDjango Version1.1.0
DjangoprojectDjango Version1.2
DjangoprojectDjango Version1.2.1
DjangoprojectDjango Version1.2.2
DjangoprojectDjango Version1.2.3
DjangoprojectDjango Version1.3 Updatealpha1
DjangoprojectDjango Version1.3 Updatealpha2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.55% 0.654
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N