Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Titlepython-django security update
Informations
NameDSA-4476First vendor Publication2019-07-05
VendorDebianLast vendor Modification2019-07-05
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Three security issues were found in Django, a Python web development framework, which could result in denial of service, incomplete sanitisation of clickable links or missing redirects of HTTP requests to HTTPS.

For the stable distribution (stretch), these problems have been fixed in version 1:1.10.7-2+deb9u5.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python-django

Original Source

Url : http://www.debian.org/security/2019/dsa-4476

CWE : Common Weakness Enumeration

%idName
33 %CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
33 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
33 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application48
Os4
Os1
Os2

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2019-07-05 21:18:33
  • First insertion