Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
http://www.vupen.com/english/advisories/2011/0439
http://www.vupen.com/english/advisories/2011/0372
http://www.securityfocus.com/bid/46296
http://www.mandriva.com/security/advisories?name=MDVSA-2011:031
http://www.djangoproject.com/weblog/2011/feb/08/security/
Published: 2011-02-14
Updated: 2025-04-11
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity: Critical
Base Score: 9.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Critical