Related Vulnerabilities: CVE-2016-9013  

When running tests with an Oracle database, Django creates a temporary database user. In older versions, if a password isn't manually specified in the database settings TEST dictionary, a hardcoded password is used. This could allow an attacker with network access to the database server to connect. This user is usually dropped after the test suite completes, but not when using the manage.py test --keepdb option or if the user has an active session (such as an attacker's connection).

Severity High

Remote Yes

Type Authentication bypass

Description

When running tests with an Oracle database, Django creates a temporary database user. In older versions, if a password isn't manually specified in the database settings TEST dictionary, a hardcoded password is used. This could allow an attacker with network access to the database server to connect.

This user is usually dropped after the test suite completes, but not when using the manage.py test --keepdb option or if the user has an active session (such as an attacker's connection).

AVG-57 python-django, python2-django 1.10.2-1 1.10.3-1 High Fixed

16 Nov 2016 ASA-201611-15 AVG-57 python-django High multiple issues

16 Nov 2016 ASA-201611-14 AVG-57 python2-django High multiple issues

https://www.djangoproject.com/weblog/2016/nov/01/security-releases/