Search for vulnerabilities
Vulnerability details: VCID-589h-ndhj-aaab
Vulnerability ID VCID-589h-ndhj-aaab
Aliases BIT-2023-31047
BIT-django-2023-31047
CVE-2023-31047
GHSA-r3xc-prgr-mg9p
PYSEC-0000-CVE-2023-31047
PYSEC-2023-61
Summary Django bypasses validation when using one form field to upload multiple files
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 5.4 https://access.redhat.com/errata/RHSA-2023:6818
ssvc Track https://access.redhat.com/errata/RHSA-2023:6818
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31047.json
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00047 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00380 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00380 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00380 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00437 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00437 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00440 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00440 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00512 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.00512 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01078 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
epss 0.01872 https://api.first.org/data/v1/epss?cve=CVE-2023-31047
cvssv3.1 7.5 https://docs.djangoproject.com/en/4.2/releases/security
generic_textual HIGH https://docs.djangoproject.com/en/4.2/releases/security
cvssv3.1 9.8 https://docs.djangoproject.com/en/4.2/releases/security/
cvssv3.1 9.8 https://docs.djangoproject.com/en/4.2/releases/security/
ssvc Track https://docs.djangoproject.com/en/4.2/releases/security/
ssvc Track https://docs.djangoproject.com/en/4.2/releases/security/
cvssv3.1 5.6 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-r3xc-prgr-mg9p
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-r3xc-prgr-mg9p
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 9.8 https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd
generic_textual CRITICAL https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd
cvssv3.1 9.8 https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64
generic_textual CRITICAL https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64
cvssv3.1 9.8 https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965
generic_textual CRITICAL https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965
cvssv3.1 9.8 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml
generic_textual CRITICAL https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml
cvssv3.1 3.7 https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 9.8 https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 9.8 https://groups.google.com/forum/#%21forum/django-announce
generic_textual MODERATE https://groups.google.com/forum/#%21forum/django-announce
ssvc Track https://groups.google.com/forum/#%21forum/django-announce
ssvc Track https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 7.5 https://groups.google.com/forum/#!forum/django-announce
generic_textual HIGH https://groups.google.com/forum/#!forum/django-announce
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2023-31047
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2023-31047
cvssv3.1 9.8 https://security.netapp.com/advisory/ntap-20230609-0008
generic_textual CRITICAL https://security.netapp.com/advisory/ntap-20230609-0008
cvssv3.1 9.8 https://security.netapp.com/advisory/ntap-20230609-0008/
cvssv3.1 9.8 https://security.netapp.com/advisory/ntap-20230609-0008/
ssvc Track https://security.netapp.com/advisory/ntap-20230609-0008/
cvssv3.1 9.8 https://www.djangoproject.com/weblog/2023/may/03/security-releases
generic_textual CRITICAL https://www.djangoproject.com/weblog/2023/may/03/security-releases
cvssv3.1 9.8 https://www.djangoproject.com/weblog/2023/may/03/security-releases/
cvssv3.1 9.8 https://www.djangoproject.com/weblog/2023/may/03/security-releases/
ssvc Track https://www.djangoproject.com/weblog/2023/may/03/security-releases/
ssvc Track https://www.djangoproject.com/weblog/2023/may/03/security-releases/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31047.json
https://api.first.org/data/v1/epss?cve=CVE-2023-31047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31047
https://docs.djangoproject.com/en/4.2/releases/security
https://docs.djangoproject.com/en/4.2/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd
https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64
https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml
https://groups.google.com/forum/#%21forum/django-announce
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
https://security.netapp.com/advisory/ntap-20230609-0008
https://security.netapp.com/advisory/ntap-20230609-0008/
https://www.djangoproject.com/weblog/2023/may/03/security-releases
https://www.djangoproject.com/weblog/2023/may/03/security-releases/
1035467 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035467
2192565 https://bugzilla.redhat.com/show_bug.cgi?id=2192565
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:4.2:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:4.2:-:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:4.2:b1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:4.2:b1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:4.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:4.2:rc1:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
CVE-2023-31047 https://nvd.nist.gov/vuln/detail/CVE-2023-31047
GHSA-r3xc-prgr-mg9p https://github.com/advisories/GHSA-r3xc-prgr-mg9p
RHSA-2023:4591 https://access.redhat.com/errata/RHSA-2023:4591
RHSA-2023:5931 https://access.redhat.com/errata/RHSA-2023:5931
RHSA-2023:6818 https://access.redhat.com/errata/RHSA-2023:6818
USN-6054-1 https://usn.ubuntu.com/6054-1/
USN-6054-2 https://usn.ubuntu.com/6054-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2023:6818
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:42:07Z/ Found at https://access.redhat.com/errata/RHSA-2023:6818
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31047.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://docs.djangoproject.com/en/4.2/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://docs.djangoproject.com/en/4.2/releases/security/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://docs.djangoproject.com/en/4.2/releases/security/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://docs.djangoproject.com/en/4.2/releases/security/

Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://docs.djangoproject.com/en/4.2/releases/security/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://groups.google.com/forum/#%21forum/django-announce

Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://groups.google.com/forum/#%21forum/django-announce
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/forum/#!forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/

Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/

Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-31047
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-31047
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://security.netapp.com/advisory/ntap-20230609-0008
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://security.netapp.com/advisory/ntap-20230609-0008/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://security.netapp.com/advisory/ntap-20230609-0008/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://security.netapp.com/advisory/ntap-20230609-0008/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.djangoproject.com/weblog/2023/may/03/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.djangoproject.com/weblog/2023/may/03/security-releases/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.djangoproject.com/weblog/2023/may/03/security-releases/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://www.djangoproject.com/weblog/2023/may/03/security-releases/

Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-29T15:49:48Z/ Found at https://www.djangoproject.com/weblog/2023/may/03/security-releases/
Exploit Prediction Scoring System (EPSS)
Percentile 0.13942
EPSS Score 0.00047
Published At April 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.