Lucene search

K
archlinuxArchLinuxASA-202006-8
HistoryJun 06, 2020 - 12:00 a.m.

[ASA-202006-8] python-django: multiple issues

2020-06-0600:00:00
security.archlinux.org
10

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.023 Low

EPSS

Percentile

89.5%

Arch Linux Security Advisory ASA-202006-8

Severity: Medium
Date : 2020-06-06
CVE-ID : CVE-2020-13254 CVE-2020-13596
Package : python-django
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1176

Summary

The package python-django before version 3.0.7-1 is vulnerable to
multiple issues including cross-site scripting and information
disclosure.

Resolution

Upgrade to 3.0.7-1.

pacman -Syu “python-django>=3.0.7-1”

The problems have been fixed upstream in version 3.0.7.

Workaround

None.

Description

  • CVE-2020-13254 (information disclosure)

An information disclosure issue has been found in Django before 3.0.7,
via malformed memcached keys. In cases where a memcached backend does
not perform key validation, passing malformed cache keys could result
in a key collision, and potential data leakage. In order to avoid this
vulnerability, key validation is added to the memcached cache backends.

  • CVE-2020-13596 (cross-site scripting)

A possible XSS has been found in Django before 3.0.7, via admin
ForeignKeyRawIdWidget. Query parameters for the admin
ForeignKeyRawIdWidget were not properly URL encoded, posing an XSS
attack vector.

Impact

A remote attacker can leak data through malformed cache keys. An
authenticated user could execute javascript through an admin widget.

References

https://www.djangoproject.com/weblog/2020/jun/03/security-releases/
https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693
https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
https://security.archlinux.org/CVE-2020-13254
https://security.archlinux.org/CVE-2020-13596

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanypython-django< 3.0.7-1UNKNOWN

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.023 Low

EPSS

Percentile

89.5%