PCI v3.2-6.5.5
CAPEC-214
CWE-16
ISO27001-A.18.1.3
WASC-14
OWASP 2013-A5
OWASP 2017-A6

Django Debug Mode Enabled

Severity:
Low
Summary

Invicti detected Django debug mode is enabled, so the target web server is disclosing some system information data in the HTTP response.

Debug mode enables extra debugging behaviors that assist developers, as well as attackers.

Impact

An attacker can obtain information such as:

  • Exact Django & Python version.
  • Used database type, database user name, current database name.
  • Details of the Django project configuration.
  • Internal file paths.
  • Exception-generated source code, local variables and their values.

This information might help an attacker gain more information and potentially to focus on the development of further attacks to the target system.

Remediation

Apply the following changes on your Django settings file to prevent this problem: set DEBUG option to False.

Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Blog

What lies ahead for CMS.

Blog

How to integrate CMS with other tools.

Blog

Improve user experience through CMS.

Blog

How CMS can benefit e-commerce.

Blog

Stay updated on CMS trends.

Blog

Tips for improving CMS performance.

Blog

Learn how to secure your CMS.

Blog

Explore the advantages of CMS.

Blog

A comprehensive guide to CMS.

Build your resistance to threats. And save hundreds of hours each month.