VuXML ID | Description |
14a37474-1383-11e0-8a58-00215c6a37bb | django -- multiple vulnerabilities
Django project reports:
Today the Django team is issuing multiple releases
-- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 --
to remedy two security issues reported to us. All users
of affected versions of Django are urged to upgrade
immediately.
Information leakage in Django administrative interface
The Django administrative interface, django.contrib.admin
supports filtering of displayed lists of objects by fields
on the corresponding models, including across database-level
relationships. This is implemented by passing lookup arguments
in the querystring portion of the URL, and options on the
ModelAdmin class allow developers to specify particular
fields or relationships which will generate automatic links
for filtering.
Denial-of-service attack in password-reset mechanism
Django's bundled authentication framework,
django.contrib.auth, offers views which allow users to
reset a forgotten password. The reset mechanism involves
generating a one-time token composed from the user's ID,
the timestamp of the reset request converted to a base36
integer, and a hash derived from the user's current password
hash (which will change once the reset is complete, thus
invalidating the token).
Discovery 2010-12-22 Entry 2010-12-29 py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
gt 1.2 lt 1.2.4
gt 1.1 lt 1.1.3
py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 15032,1
45562
45563
https://bugzilla.redhat.com/show_bug.cgi?id=665373
http://secunia.com/advisories/42715/
|
3ff95dd3-c291-11df-b0dc-00215c6a37bb | django -- cross-site scripting vulnerability
Django project reports:
The provided template tag for inserting the CSRF
token into forms -- {% csrf_token %} -- explicitly
trusts the cookie value, and displays it as-is.
Thus, an attacker who is able to tamper with the
value of the CSRF cookie can cause arbitrary content
to be inserted, unescaped, into the outgoing HTML of
the form, enabling cross-site scripting (XSS) attacks.
Discovery 2010-09-13 Entry 2010-09-17 py23-django
py24-django
py25-django
py26-django
py30-django
py31-django
gt 1.2 lt 1.2.2
py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py30-django-devel
py31-django-devel
< 13698,1
43116
CVE-2010-3082
http://xforce.iss.net/xforce/xfdb/61729
|
87917d6f-ba76-11de-bac2-001a4d563a0f | django -- denial-of-service attack
Django project reports:
Django's forms library includes field types which perform
regular-expression-based validation of email addresses and
URLs. Certain addresses/URLs could trigger a pathological
performance case in these regular expression, resulting in
the server process/thread becoming unresponsive, and consuming
excessive CPU over an extended period of time. If deliberately
triggered, this could result in an effectively
denial-of-service attack.
Discovery 2009-10-09 Entry 2009-10-16 Modified 2010-05-02 py23-django
py24-django
py25-django
py26-django
py30-django
py31-django
< 1.1.1
py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py30-django-devel
py31-django-devel
< 11603,1
CVE-2009-3695
http://www.djangoproject.com/weblog/2009/oct/09/security/
|
bd760627-3493-11e0-8103-00215c6a37bb | django -- multiple vulnerabilities
Django project reports:
Today the Django team is issuing multiple releases --
Django 1.2.5 and Django 1.1.4 -- to remedy three security
issues reported to us. All users of affected versions of
Django are urged to upgrade immediately.
Discovery 2011-02-08 Entry 2011-02-09 py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
gt 1.2 lt 1.2.5
gt 1.1 lt 1.1.4
py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 15470,1
http://www.djangoproject.com/weblog/2011/feb/08/security/
|
d01d10c7-de2d-11e0-b215-00215c6a37bb | django -- multiple vulnerabilities
The Django project reports:
Please reference CVE/URL list for details
Discovery 2011-09-09 Entry 2011-09-13 Modified 2011-11-01 py23-django
py24-django
py25-django
py26-django
py27-django
py30-django
py31-django
ge 1.3 lt 1.3.1
ge 1.2 lt 1.2.7
py23-django-devel
py24-django-devel
py25-django-devel
py26-django-devel
py27-django-devel
py30-django-devel
py31-django-devel
< 16758,1
https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/
|
d2c2952d-85a1-11dc-bfff-003048705d5a | py-django -- denial of service vulnerability
Django project reports:
A per-process cache used by Django's internationalization
("i18n") system to store the results of translation lookups
for particular values of the HTTP Accept-Language header
used the full value of that header as a key. An attacker
could take advantage of this by sending repeated requests
with extremely large strings in the Accept-Language header,
potentially causing a denial of service by filling available
memory.
Due to limitations imposed by Web server software on the
size of HTTP header fields, combined with reasonable limits
on the number of requests which may be handled by a single
server process over its lifetime, this vulnerability may be
difficult to exploit. Additionally, it is only present when
the "USE_I18N" setting in Django is "True" and the i18n
middleware component is enabled*. Nonetheless, all users of
affected versions of Django are encouraged to update.
Discovery 2007-10-26 Entry 2007-10-27 py23-django
py24-django
py25-django
< 0.96.1
py23-django-devel
py24-django-devel
py25-django-devel
< 20071026
http://www.djangoproject.com/weblog/2007/oct/26/security-fix/
|
f49ba347-2190-11dd-907c-001c2514716c | django -- XSS vulnerability
Django project reports:
The Django administration application will, when accessed by
a user who is not sufficiently authenticated, display a login
form and ask the user to provide the necessary credentials
before displaying the requested page. This form will be submitted
to the URL the user attempted to access, by supplying the current
request path as the value of the form's "action" attribute.
The value of the request path was not being escaped, creating an
opportunity for a cross-site scripting (XSS) attack by leading a
user to a URL which contained URL-encoded HTML and/or JavaScript
in the request path.
Discovery 2008-05-10 Entry 2008-05-14 Modified 2010-05-12 py23-django
py24-django
py25-django
< 0.96.2
py23-django-devel
py24-django-devel
py25-django-devel
< 20080511
CVE-2008-2302
http://www.djangoproject.com/weblog/2008/may/14/security/
|