Safety vulnerability ID: 33062
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application