Summary #

Netsparker detected Django debug mode is enabled, so the target web server is disclosing some system information data in the HTTP response.

Debug mode enables extra debugging behaviors that assist developers, as well as attackers.

Impact #
An attacker can obtain information such as:
  • Exact Django & Python version.
  • Used database type, database user name, current database name.
  • Details of the Django project configuration.
  • Internal file paths.
  • Exception-generated source code, local variables and their values.
This information might help an attacker gain more information and potentially to focus on the development of further attacks to the target system.
Remediation #
Apply the following changes on your Django settings file to prevent this problem: set DEBUG option to False.
Classifications #
PCI v3.1-6.5.5; PCI v3.2-6.5.5; CAPEC-214; CWE-16; ISO27001-A.18.1.3; WASC-14; OWASP 2013-A5; OWASP 2017-A6
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities


Search Vulnerability


Dead accurate, fast & easy-to-use Web Application Security Scanner

Get a demo