Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk: High] 2 Insecure Permissions vulnerabilites in Django (due 10/9/20) #4027

Closed
1 task
Tracked by #137
lbeaufort opened this issue Sep 9, 2020 · 0 comments · Fixed by #4076
Closed
1 task
Tracked by #137

[Snyk: High] 2 Insecure Permissions vulnerabilites in Django (due 10/9/20) #4027

lbeaufort opened this issue Sep 9, 2020 · 0 comments · Fixed by #4076
Assignees
Labels
Security: high Remediate within 30 days
Milestone

Comments

@lbeaufort
Copy link
Member

lbeaufort commented Sep 9, 2020

Vulnerable module: Django
Introduced through: django@2.2.13, django-storages@1.7.1 and others
No known exploit
Fixed in: 2.2.16, 3.0.10, 3.1.1

Overview
Affected versions of this package are vulnerable to Insecure Permissions. The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.

https://app.snyk.io/vuln/SNYK-PYTHON-DJANGO-609369

Affected versions of this package are vulnerable to Insecure Permissions. On Python 3.7 and above, FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.

https://app.snyk.io/vuln/SNYK-PYTHON-DJANGO-609368

Completion criteria:

  • Verify that this is still an issue and address the vulnerability as necessary
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Security: high Remediate within 30 days
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants