Executive Summary
Summary | |
---|---|
Title | python-django security update |
Informations | |||
---|---|---|---|
Name | RHSA-2016:1596 | First vendor Publication | 2016-08-11 |
Vendor | RedHat | Last vendor Modification | 2016-08-11 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for python-django is now available for Red Hat OpenStack Platform 8.0 (Liberty). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 8.0 (Liberty) - noarch 3. Description: Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle. Security Fix(es): * A cross-site scripting (XSS) flaw was found in Django. An attacker could exploit the unsafe usage of JavaScript's Element.innerHTML to forge content in the admin's add/change related popup. Element.textContent is now used to prevent XSS data execution. (CVE-2016-6186) Red Hat would like to thank the upstream Django project for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1355663 - CVE-2016-6186 django: XSS in admin's add/change related popup |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2016-1596.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-08-03 | Name : The remote Fedora host is missing a security update. File : fedora_2016-97ca9d52a4.nasl - Type : ACT_GATHER_INFO |
2016-08-03 | Name : The remote Fedora host is missing a security update. File : fedora_2016-b7e31a0b9a.nasl - Type : ACT_GATHER_INFO |
2016-07-22 | Name : The remote Debian host is missing a security update. File : debian_DLA-555.nasl - Type : ACT_GATHER_INFO |
2016-07-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3039-1.nasl - Type : ACT_GATHER_INFO |
2016-07-19 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3622.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-08-11 05:22:56 |
|