Vulnerability Details CVE-2016-9013
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.027
EPSS Ranking 85.3%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2016-9013
-
cpe:2.3:a:djangoproject:django:1.10
-
cpe:2.3:a:djangoproject:django:1.10.1
-
cpe:2.3:a:djangoproject:django:1.10.2
-
cpe:2.3:a:djangoproject:django:1.8
-
cpe:2.3:a:djangoproject:django:1.8.1
-
cpe:2.3:a:djangoproject:django:1.8.10
-
cpe:2.3:a:djangoproject:django:1.8.11
-
cpe:2.3:a:djangoproject:django:1.8.12
-
cpe:2.3:a:djangoproject:django:1.8.13
-
cpe:2.3:a:djangoproject:django:1.8.14
-
cpe:2.3:a:djangoproject:django:1.8.15
-
cpe:2.3:a:djangoproject:django:1.8.2
-
cpe:2.3:a:djangoproject:django:1.8.3
-
cpe:2.3:a:djangoproject:django:1.8.4
-
cpe:2.3:a:djangoproject:django:1.8.5
-
cpe:2.3:a:djangoproject:django:1.8.6
-
cpe:2.3:a:djangoproject:django:1.8.7
-
cpe:2.3:a:djangoproject:django:1.8.8
-
cpe:2.3:a:djangoproject:django:1.8.9
-
cpe:2.3:a:djangoproject:django:1.9
-
cpe:2.3:a:djangoproject:django:1.9.1
-
cpe:2.3:a:djangoproject:django:1.9.10
-
cpe:2.3:a:djangoproject:django:1.9.2
-
cpe:2.3:a:djangoproject:django:1.9.3
-
cpe:2.3:a:djangoproject:django:1.9.4
-
cpe:2.3:a:djangoproject:django:1.9.5
-
cpe:2.3:a:djangoproject:django:1.9.6
-
cpe:2.3:a:djangoproject:django:1.9.7
-
cpe:2.3:a:djangoproject:django:1.9.8
-
cpe:2.3:a:djangoproject:django:1.9.9
-
cpe:2.3:o:canonical:ubuntu_linux:12.04
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.10
-
cpe:2.3:o:fedoraproject:fedora:24
-
cpe:2.3:o:fedoraproject:fedora:25