Executive Summary
Summary | |
---|---|
Title | python-django security update |
Informations | |||
---|---|---|---|
Name | DSA-3010 | First vendor Publication | 2014-08-22 |
Vendor | Debian | Last vendor Modification | 2014-08-22 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities were discovered in Django, a high-level Python web development framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-0480 Florian Apolloner discovered that in certain situations, URL reversing could generate scheme-relative URLs which could unexpectedly redirect a user to a different host, leading to phishing attacks. CVE-2014-0481 David Wilson reported a file upload denial of service vulnerability. Django's file upload handling in its default configuration may degrade to producing a huge number of `os.stat()` system calls when a duplicate filename is uploaded. A remote attacker with the ability to upload files can cause poor performance in the upload handler, eventually causing it to become very slow. CVE-2014-0482 David Greisen discovered that under some circumstances, the use of the RemoteUserMiddleware middleware and the RemoteUserBackend authentication backend could result in one user receiving another user's session, if a change to the REMOTE_USER header occurred without corresponding logout/login actions. CVE-2014-0483 Collin Anderson discovered that it is possible to reveal any field's data by modifying the "popup" and "to_field" parameters of the query string on an admin change form page. A user with access to the admin interface, and with sufficient knowledge of model structure and the appropriate URLs, could construct popup views which would display the values of non-relationship fields, including fields the application developer had not intended to expose in such a fashion. For the stable distribution (wheezy), these problems have been fixed in version 1.4.5-1+deb7u8. For the unstable distribution (sid), these problems have been fixed in version 1.6.6-1. We recommend that you upgrade your python-django packages. |
Original Source
Url : http://www.debian.org/security/2014/dsa-3010 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
25 % | CWE-399 | Resource Management Errors |
25 % | CWE-287 | Improper Authentication |
25 % | CWE-264 | Permissions, Privileges, and Access Controls |
25 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:25935 | |||
Oval ID: | oval:org.mitre.oval:def:25935 | ||
Title: | DSA-3010-1 python-django - security update | ||
Description: | Several vulnerabilities were discovered in Django, a high-level Python web development framework. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3010-1 CVE-2014-0480 CVE-2014-0481 CVE-2014-0482 CVE-2014-0483 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | python-django |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26675 | |||
Oval ID: | oval:org.mitre.oval:def:26675 | ||
Title: | USN-2347-1 -- python-django vulnerabilities | ||
Description: | Several security issues were fixed in Django. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2347-1 CVE-2014-0480 CVE-2014-0481 CVE-2014-0482 CVE-2014-0483 | Version: | 3 |
Platform(s): | Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | python-django |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-65.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-22.nasl - Type : ACT_GATHER_INFO |
2014-12-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15266.nasl - Type : ACT_GATHER_INFO |
2014-12-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15307.nasl - Type : ACT_GATHER_INFO |
2014-09-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-542.nasl - Type : ACT_GATHER_INFO |
2014-09-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2347-1.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2014-179.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9866.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9771.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9788.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9791.nasl - Type : ACT_GATHER_INFO |
2014-08-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3010.nasl - Type : ACT_GATHER_INFO |
2014-08-22 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_3c5579f7294a11e499f600e0814cab4e.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-08-27 21:26:55 |
|
2014-08-26 21:28:05 |
|
2014-08-24 13:25:21 |
|
2014-08-23 00:23:53 |
|