Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title python-django security update
Informations
Name DSA-3151 First vendor Publication 2015-02-03
Vendor Debian Last vendor Modification 2015-02-03
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities were discovered in Django, a high-level Python web development framework. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2015-0219

Jedediah Smith reported that the WSGI environ in Django does not distinguish between headers containing dashes and headers containing underscores. A remote attacker could use this flaw to spoof WSGI headers.

CVE-2015-0220

Mikko Ohtamaa discovered that the django.util.http.is_safe_url() function in Django does not properly handle leading whitespaces in user-supplied redirect URLs. A remote attacker could potentially use this flaw to perform a cross-site scripting attack.

CVE-2015-0221

Alex Gaynor reported a flaw in the way Django handles reading files in the django.views.static.serve() view. A remote attacker could possibly use this flaw to mount a denial of service via resource consumption.

For the stable distribution (wheezy), these problems have been fixed in version 1.4.5-1+deb7u9.

For the upcoming stable distribution (jessie), these problems have been fixed in version 1.7.1-1.1.

For the unstable distribution (sid), these problems have been fixed in version 1.7.1-1.1.

We recommend that you upgrade your python-django packages.

Original Source

Url : http://www.debian.org/security/2015/dsa-3151

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-399 Resource Management Errors
33 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
33 % CWE-17 Code

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 70
Os 4

Nessus® Vulnerability Scanner

Date Description
2015-09-23 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-598.nasl - Type : ACT_GATHER_INFO
2015-04-02 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-281.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-109.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-143.nasl - Type : ACT_GATHER_INFO
2015-02-09 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2015-036.nasl - Type : ACT_GATHER_INFO
2015-02-05 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2469-2.nasl - Type : ACT_GATHER_INFO
2015-02-03 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3151.nasl - Type : ACT_GATHER_INFO
2015-01-27 Name : The remote Fedora host is missing a security update.
File : fedora_2015-0790.nasl - Type : ACT_GATHER_INFO
2015-01-27 Name : The remote Fedora host is missing a security update.
File : fedora_2015-0804.nasl - Type : ACT_GATHER_INFO
2015-01-26 Name : The remote Fedora host is missing a security update.
File : fedora_2015-0714.nasl - Type : ACT_GATHER_INFO
2015-01-26 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_9c7b6c20a32411e4879c00e0814cab4e.nasl - Type : ACT_GATHER_INFO
2015-01-14 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2469-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2016-12-22 09:25:36
  • Multiple Updates
2015-03-24 09:33:47
  • Multiple Updates
2015-02-13 17:26:44
  • Multiple Updates
2015-02-04 13:24:43
  • Multiple Updates
2015-02-03 09:22:00
  • First insertion