5
CVSSv2

CVE-2015-0846

Published: 24/04/2015 Updated: 27/04/2015
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

django-markupfield prior to 1.3.2 uses the default docutils RESTRUCTUREDTEXT_FILTER_SETTINGS settings, which allows remote malicious users to include and read arbitrary files via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

django-markupfield project django-markupfield

Vendor Advisories

James P Turk discovered that the ReST renderer in django-markupfield, a custom Django field for easy use of markup in text fields, didn't disable the raw directive, allowing remote attackers to include arbitrary files For the stable distribution (wheezy), this problem has been fixed in version 102-2+deb7u1 For the upcoming stable distributio ...