Executive Summary
Summary | |
---|---|
Title | Django vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2169-1 | First vendor Publication | 2014-04-22 |
Vendor | Ubuntu | Last vendor Modification | 2014-04-22 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in Django. Software Description: - python-django: High-level Python web development framework Details: Benjamin Bach discovered that Django incorrectly handled dotted Python paths when using the reverse() function. An attacker could use this issue to cause Django to import arbitrary modules from the Python path, resulting in possible code execution. (CVE-2014-0472) Paul McMillan discovered that Django incorrectly cached certain pages that contained CSRF cookies. An attacker could possibly use this flaw to obtain a valid cookie and perform attacks which bypass the CSRF restrictions. (CVE-2014-0473) Michael Koziarski discovered that Django did not always perform explicit conversion of certain fields when using a MySQL database. An attacker could possibly use this issue to obtain unexpected results. (CVE-2014-0474) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: Ubuntu 13.10: Ubuntu 12.10: Ubuntu 12.04 LTS: Ubuntu 10.04 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2169-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-399 | Resource Management Errors |
33 % | CWE-264 | Permissions, Privileges, and Access Controls |
33 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24598 | |||
Oval ID: | oval:org.mitre.oval:def:24598 | ||
Title: | USN-2169-2 -- python-django regression | ||
Description: | USN-2169-1 introduced a regression in Django. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2169-2 CVE-2014-0472 CVE-2014-0473 CVE-2014-0474 | Version: | 5 |
Platform(s): | Ubuntu 14.04 Ubuntu 13.10 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | python-django |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24655 | |||
Oval ID: | oval:org.mitre.oval:def:24655 | ||
Title: | USN-2169-1 -- python-django vulnerabilities | ||
Description: | Several security issues were fixed in Django. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2169-1 CVE-2014-0472 CVE-2014-0473 CVE-2014-0474 | Version: | 5 |
Platform(s): | Ubuntu 14.04 Ubuntu 13.10 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | python-django |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_django_20140731.nasl - Type : ACT_GATHER_INFO |
2014-09-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-542.nasl - Type : ACT_GATHER_INFO |
2014-06-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201406-26.nasl - Type : ACT_GATHER_INFO |
2014-06-11 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2014-113.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2934.nasl - Type : ACT_GATHER_INFO |
2014-05-03 | Name : The remote Fedora host is missing a security update. File : fedora_2014-5562.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-5475.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-5486.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-5503.nasl - Type : ACT_GATHER_INFO |
2014-04-24 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_59e72db2cae611e3842000e0814cab4e.nasl - Type : ACT_GATHER_INFO |
2014-04-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2169-1.nasl - Type : ACT_GATHER_INFO |
2014-04-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2169-2.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-04-24 21:26:31 |
|
2014-04-24 13:21:56 |
|
2014-04-23 21:25:19 |
|
2014-04-22 17:19:34 |
|