Summary

Acunetix 360 identified a stack trace disclosure (Django) in the target web server's HTTP response.

Impact

An attacker can obtain information such as:
  • Exact Django & Python version.
  • Used database type, database user name, current database name.
  • Details of the Django project configuration.
  • Internal file paths.
  • Exception-generated source code, local variables and their values.
This information might help an attacker gain more information and potentially focus on the development of further attacks for the target system.

Remediation

Apply the following changes on your Django settings file to prevent this problem: set DEBUG option to False.

Severity

Medium

Classification

PCI v3.2-6.5.5 CAPEC-214 CWE-248 HIPAA-164.306(a) 164.308(a) ISO27001-A.18.1.3 WASC-14 OWASP 2013-A5 OWASP 2017-A6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N