Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.
{"redhat": [{"lastseen": "2021-10-21T04:45:14", "description": "Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.\n\nThe following packages have been upgraded to a later upstream version: python-django (1.8.18). (BZ#1437737)\n\nSecurity Fix(es):\n\n* A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard. (CVE-2017-7233)\n\nRed Hat would like to thank the Django project for reporting this issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-06-28T14:25:13", "type": "redhat", "title": "(RHSA-2017:1596) Moderate: python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2018-03-19T12:26:38", "id": "RHSA-2017:1596", "href": "https://access.redhat.com/errata/RHSA-2017:1596", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-10-21T04:44:48", "description": "Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.\n\nSecurity Fix(es):\n\n* A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard. (CVE-2017-7233)\n\nRed Hat would like to thank the Django project for reporting this issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-06-14T15:00:25", "type": "redhat", "title": "(RHSA-2017:1445) Moderate: python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2018-03-19T12:26:57", "id": "RHSA-2017:1445", "href": "https://access.redhat.com/errata/RHSA-2017:1445", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-10-21T04:47:07", "description": "Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.\n\nSecurity Fix(es):\n\n* A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard. (CVE-2017-7233)\n\nRed Hat would like to thank the Django project for reporting this issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-10-31T17:11:39", "type": "redhat", "title": "(RHSA-2017:3093) Moderate: python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2017-10-31T17:12:25", "id": "RHSA-2017:3093", "href": "https://access.redhat.com/errata/RHSA-2017:3093", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-10-21T04:44:37", "description": "Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.\n\nSecurity Fix(es):\n\n* A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard. (CVE-2017-7233)\n\nRed Hat would like to thank the Django project for reporting this issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-06-14T15:05:27", "type": "redhat", "title": "(RHSA-2017:1462) Moderate: python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2018-03-19T12:27:43", "id": "RHSA-2017:1462", "href": "https://access.redhat.com/errata/RHSA-2017:1462", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-10-21T04:43:01", "description": "Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.\n\nSecurity Fix(es):\n\n* A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard. (CVE-2017-7233)\n\nRed Hat would like to thank the Django project for reporting this issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-06-14T15:02:31", "type": "redhat", "title": "(RHSA-2017:1451) Moderate: python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2018-03-19T12:27:17", "id": "RHSA-2017:1451", "href": "https://access.redhat.com/errata/RHSA-2017:1451", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-10-21T04:46:15", "description": "Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle.\n\nSecurity Fix(es):\n\n* A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard. (CVE-2017-7233)\n\nRed Hat would like to thank the Django project for reporting this issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-06-14T15:06:01", "type": "redhat", "title": "(RHSA-2017:1470) Moderate: python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2018-03-19T12:27:29", "id": "RHSA-2017:1470", "href": "https://access.redhat.com/errata/RHSA-2017:1470", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-10-19T20:40:40", "description": "Red Hat Satellite is a systems management tool for Linux-based infrastructure.\nIt allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool.\n\nSecurity Fix(es):\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* hornetq: XXE/SSRF in XPath selector (CVE-2015-3208)\n\n* bouncycastle: Information disclosure in GCMBlockCipher (CVE-2015-6644)\n\n* bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data (CVE-2016-1000338)\n\n* bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339)\n\n* bouncycastle: Information exposure in DSA signature generation via timing attack (CVE-2016-1000341)\n\n* bouncycastle: ECDSA improper validation of ASN.1 encoding of signature (CVE-2016-1000342)\n\n* bouncycastle: DHIES implementation allowed the use of ECB mode (CVE-2016-1000344)\n\n* bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack (CVE-2016-1000345)\n\n* bouncycastle: Other party DH public keys are not fully validated (CVE-2016-1000346)\n\n* bouncycastle: ECIES implementation allowed the use of ECB mode (CVE-2016-1000352)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs (CVE-2017-7233)\n\n* hibernate-validator: Privilege escalation when running under the security manager (CVE-2017-7536)\n\n* puppet: Environment leakage in puppet-agent (CVE-2017-10690)\n\n* Satellite 6: XSS in discovery rule filter autocomplete functionality (CVE-2017-12175)\n\n* foreman: Stored XSS in fact name or value (CVE-2017-15100)\n\n* pulp: sensitive credentials revealed through the API (CVE-2018-1090)\n\n* foreman: SQL injection due to improper handling of the widget id parameter (CVE-2018-1096)\n\n* foreman: Ovirt admin password exposed by foreman API (CVE-2018-1097)\n\n* django: Catastrophic backtracking in regular expressions via 'urlize' and 'urlizetrunc' (CVE-2018-7536)\n\n* django: Catastrophic backtracking in regular expressions via 'truncatechars_html' and 'truncatewords_html' (CVE-2018-7537)\n\n* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service (CVE-2018-10237)\n\n* bouncycastle: Carry propagation bug in math.raw.Nat??? class (CVE-2016-1000340)\n\n* bouncycastle: DSA key pair generator generates a weak private key by default (CVE-2016-1000343)\n\n* puppet: Unpacking of tarballs in tar/mini.rb can create files with insecure permissions (CVE-2017-10689)\n\n* bouncycastle: BKS-V1 keystore files vulnerable to trivial hash collisions (CVE-2018-5382)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-15095; and the Django project for reporting CVE-2017-7233, CVE-2018-7536, and CVE-2018-7537. The CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); and the CVE-2018-1096 issue was discovered by Martin Povolny (Red Hat). Red Hat would also like to thank David Jorm (IIX Product Security) for reporting CVE-2015-3208.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-10-16T14:18:07", "type": "redhat", "title": "(RHSA-2018:2927) Important: Satellite 6.4 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3208", "CVE-2015-6644", "CVE-2016-1000338", "CVE-2016-1000339", "CVE-2016-1000340", "CVE-2016-1000341", "CVE-2016-1000342", "CVE-2016-1000343", "CVE-2016-1000344", "CVE-2016-1000345", "CVE-2016-1000346", "CVE-2016-1000352", "CVE-2017-10689", "CVE-2017-10690", "CVE-2017-12175", "CVE-2017-15095", "CVE-2017-15100", "CVE-2017-5929", "CVE-2017-7233", "CVE-2017-7525", "CVE-2017-7536", "CVE-2018-10237", "CVE-2018-1090", "CVE-2018-1096", "CVE-2018-1097", "CVE-2018-5382", "CVE-2018-6188", "CVE-2018-7536", "CVE-2018-7537"], "modified": "2020-08-04T12:49:39", "id": "RHSA-2018:2927", "href": "https://access.redhat.com/errata/RHSA-2018:2927", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "seebug": [{"lastseen": "2017-11-19T12:00:07", "description": "Source: [same thread safety Emergency Response Center](<https://mp.weixin.qq.com/s?__biz=MzI4MzI4MDg1NA==&mid=2247483817&idx=1&sn=5a1fd58b65edf4b88d2f455a486b97bd>) \nAuthor: **Nearg1e@YSRC**\n\nForeign security researcher roks0n provided to the Django official of a vulnerability.\n\n#### On is_safe_url function\n\nDjango comes with a function: `django. utils. http. is_safe_url(url, host=None, allowed_hosts=None, require_https=False) `for filtering the need for the jump of the url. If the url is safe then return ture, insecurity, false is returned. The document is as follows:\n\n``python print(is_safe_url.**doc**)\n\nReturn `True ` if the url is a safe redirection (i.e. it doesn't point to a different host and uses a safe scheme).\n\nAlways returns `False ` on an empty url.\n\nIf `require_https ` is `True`, only 'https' will be considered a valid scheme, as opposed to 'http' and 'https' with the default, `False`. ``\n\nLet's look at the conventional of the several usages:\n\n``python from django. utils. http import is_safe_url\n\nIn [2]: is_safe_url('http://baidu.com') Out[2]: False\n\nIn [3]: is_safe_url('baidu.com') Out[3]: True\n\nIn [5]: is_safe_url('aaaaa') Out[5]: True\n\nIn [8]: is_safe_url('//blog.neargle.com') Out[8]: False\n\nIn [7]: is_safe_url('http://google.com/adadadadad','blog.neargle.com') Out[7]: False\n\nIn [13]: is_safe_url('http://blog.neargle.com/aaaa/bbb', 'blog.neargle.com') Out[13]: True ``\n\nVisible in the absence of the designated second parameter of the host case,the url if the non-relative path, i.e., the `HttpResponseRedirect `function will jump to another site, the is_safe_url it is determined that it is unsafe url,if you specify a host as `blog.neargle.com `then `is_safe_url `will determine whether the url belongs to the\u2019blog.neargle.com\u2019if the url is\u2019blog.neargle.com\u2019or the relative path of the url, it is determined that the url is safe.\n\n#### urllib. parse. urlparse special case\n\nThe problem lies in the function of the domain name and the method of determination is based on `urllib. parse. urlparse` Of,the source code is as follows(the `django/utils/http.py`):\n\n`python def _is_safe_url(url, host): if url. startswith('///'): return False url_info = urlparse(url) if not url_info. netloc and url_info. scheme: return False if unicodedata. category(url[0])[0] == 'C': return False return ((not url_info. netloc or url_info. netloc == host) and (not url_info. scheme or url_info. the scheme in ['http', 'https']))`\n\nWe take a look at the urlparse conventional usage and several urlparse unable to handle the special case.\n\n``python\n\n> > > urlparse('http://blog.neargle.com/2017/01/09/chrome-ext-spider-for-probe/') ParseResult(scheme='http', netloc='blog.neargle.com', path='/2017/01/09/ chrome-ext-spider-for-probe/', params=\", query=\", fragment=\")\n>>> \n>>> urlparse('ftp:99999999') ParseResult(scheme=\", netloc=\", path='ftp:99999999', params=\", query=\", fragment=\")\n>>> \n>>> urlparse('http:99999999') ParseResult(scheme='http', netloc=\", path='99999999', params=\", query=\", fragment=\")\n>>> \n>>> urlparse('https:99999999') ParseResult(scheme=\", netloc=\", path='https:99999999', params=\", query=\", fragment=\")\n>>> \n>>> urlparse('javascript:222222') ParseResult(scheme=\", netloc=\", path='javascript:222222', params=\", query=\", fragment=\")\n>>> \n>>> urlparse('ftp:aaaaaaa') ParseResult(scheme='ftp', netloc=\", path='aaaaaaa', params=\", query=\", fragment=\")\n>>> \n>>> urlparse('ftp:127.0.0.1') ParseResult(scheme='ftp', netloc=\", path='127.0.0.1', params=\", query=\", fragment=\")\n>>> \n>>> urlparse('ftp:127.0.0.1') ParseResult(scheme='ftp', netloc=\", path='127.0.0.1', params=\", query=\", fragment=\") ``\n\nCan be found when the scheme is not equal to http, and the path is purely digital,urlparse processing, for example, `aaaa:2222222223 `the case is not properly divided, will all return to the path. In this case `url_info. netloc == url_info. scheme == \"\"`then `((not url_info. netloc or url_info. netloc == host) and (not url_info. scheme or url_info. the scheme in ['http', 'https'])) `is true. Here, incidentally, [django official News&Event ](<https://www.djangoproject.com/weblog/2017/apr/04/security-releases/>)mentioned in the poc:\"http:99999999\"is unable to bypass, in front of the judge `if not url_info. netloc and url_info. scheme: `it can not.\uff09 For example, the following situations:\n\n``\n\n> > > is_safe_url('http:555555555') False is_safe_url('ftp:23333333333') True is_safe_url('https:2333333333') True ``\n\n#### The use of IP Decimal Bypass is_safe_url\n\nBut since it is a url jump vulnerability, we need to make a jump to the specified url, https:2333333333\u8fd9\u6837\u7684url\u660e\u663e\u662f\u65e0\u6cd5\u8bbf\u95ee\u7684 and colon must be followed by pure digital,http:127.0.0.1\u662f\u65e0\u6cd5pypass\u7684 the. What method? In fact, ip is not only the common dotted decimal notation,a decimal number can also represent an ip address,the browser is also supported. For example: `127.0.0.1 == 2130706433, 8.8.8.8 == 134744072 `(Converter:http://www. ipaddressguide. com/ip ),and'http:2130706433'is on the browser can access to the corresponding ip and services, i.e.`'http:2130706433 = http://127.0.0.1/'`the.\n\nHere we use `https:1029415385 ` as a poc, this is a google ip,this url can be `bypassis_safe_url ` and jump to google. com.\n\n\n\n#### Vulnerability validation with the impact\n\nWe have to write a simple environment:\n\n``python from django. http import HttpResponseRedirect from django. utils. http import is_safe_url\n\ndef BypassIsUrlSafeCheck(request): url = request. GET. get(\"url\", \") if is_safe_url(url, host=\"blog.neargle.com\"): return HttpResponseRedirect(url) else: return HttpResponseRedirect('/') ``\n\nThen visit: `http://127.0.0.1:8000/bypassIsUrlSafeCheck?url=https:1029415385` , as shown in Figure,url\u88ab\u91cd\u5b9a\u5411\u5230\u4e86google.com the.\n\nNot only the developers themselves use `is_safe_url `will be affected, Django by default comes with the admin also use this function to process the next GET | POST parameters, when the user access`/admin/login/? next=https:1029415385 `log, \u767b\u5f55\u540e\u540c\u6837\u4f1a\u8df3\u8f6c\u5230google.com to exit the login is the same used by the function.\n\n``python def _get_login_redirect_url(request, redirect_to): # Ensure the user-originating redirection URL is safe. if not is_safe_url(url=redirect_to, host=request. get_host()): return resolve_url(settings. LOGIN_REDIRECT_URL) return redirect_to\n\n@never_cache def login(request, template_name='registration/login.html', redirect_field_name=REDIRECT_FIELD_NAME, authentication_form=AuthenticationForm, extra_context=None, redirect_authenticated_user=False): ...... return HttpResponseRedirect(_get_login_redirect_url(request, redirect_to)) ...... ``\n\n\n\n#### Repair\n\ndjango fix the code yourself refactoring a bit urlparse function,fix the urlparse function of this vulnerability.\n\n``python\n\n# Copied from urllib. parse. urlparse() but uses fixed urlsplit() function.\n\ndef _urlparse(url, scheme=\", allow_fragments=True): \"\"\"Parse a URL into 6 components: :///;?# Return a 6-tuple: (scheme, netloc, path, params, query, fragment). Note that we don't break the components up in smaller bits (e.g. netloc is a single string) and we don't expand % escapes.\"\"\" url, scheme, _coerce_result = _coerce_args(url, scheme) splitresult = _urlsplit(url, scheme, allow_fragments) scheme, netloc, url, query, fragment = splitresult if scheme in uses_params and ';' in url: url, params = _splitparams(url) else: params = \" result = ParseResult(scheme, netloc, url, params, query, fragment) return _coerce_result(result) ``\n\n#### On the official mentioned possible XSS attack\n\ndjango official News&Event mentioned in this vulnerability may produce a XSS, I think unless the programmer to accept a jump to the url inserted into `a<script type=\"text/javascript\" src=\"{{ url }}\"></script>`and other special circumstances, direct use to produce XSS in the scene is still relatively small. If you think of the other scenes also please enlighten me and good it.\n", "cvss3": {}, "published": "2017-04-13T00:00:00", "type": "seebug", "title": "Django is_safe_url() the URL to jump to the filter function of the Bypass\uff08CVE-2017-7233\uff09", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2017-7233"], "modified": "2017-04-13T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-92943", "id": "SSV:92943", "sourceData": "", "sourceHref": "", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}], "ubuntucve": [{"lastseen": "2021-11-22T21:54:14", "description": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies\non user input in some cases to redirect the user to an \"on success\" URL.\nThe security check for these redirects (namely\n``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\"\nwhen they shouldn't be, aka an open redirect vulnerability. Also, if a\ndeveloper relies on ``is_safe_url()`` to provide safe redirect targets and\nputs such a URL into a link, they could suffer from an XSS attack.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-04T00:00:00", "type": "ubuntucve", "title": "CVE-2017-7233", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2017-04-04T00:00:00", "id": "UB:CVE-2017-7233", "href": "https://ubuntu.com/security/CVE-2017-7233", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "github": [{"lastseen": "2022-05-13T12:33:27", "description": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2019-01-04T17:50:26", "type": "github", "title": "Moderate severity vulnerability that affects django", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2021-08-31T20:50:45", "id": "GHSA-37HP-765X-J95X", "href": "https://github.com/advisories/GHSA-37hp-765x-j95x", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "description": "Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-22T09:23:38", "type": "fedora", "title": "[SECURITY] Fedora 25 Update: python-django-1.9.13-1.fc25", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2017-04-22T09:23:38", "id": "FEDORA:7ACB360769EF", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4A2R545N5GFHXOOANKYBZ6OAFB3V5DFV/", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:34:17", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2017-04-23T00:00:00", "type": "openvas", "title": "Fedora Update for python-django FEDORA-2017-c0ef6054d7", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7233"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310872609", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872609", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for python-django FEDORA-2017-c0ef6054d7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872609\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-23 06:45:36 +0200 (Sun, 23 Apr 2017)\");\n script_cve_id(\"CVE-2017-7233\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for python-django FEDORA-2017-c0ef6054d7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'python-django'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"python-django on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-c0ef6054d7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2R545N5GFHXOOANKYBZ6OAFB3V5DFV\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"python-django\", rpm:\"python-django~1.9.13~1.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-05-29T18:34:07", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2017-04-05T00:00:00", "type": "openvas", "title": "Ubuntu Update for python-django USN-3254-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7234", "CVE-2017-7233"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310843125", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843125", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for python-django USN-3254-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843125\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-05 06:36:37 +0200 (Wed, 05 Apr 2017)\");\n script_cve_id(\"CVE-2017-7233\", \"CVE-2017-7234\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for python-django USN-3254-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'python-django'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that Django incorrectly\n handled numeric redirect URLs. A remote attacker could possibly use this issue\n to perform XSS attacks, and to use a Django server as an open redirect.\n (CVE-2017-7233) Phithon Gong discovered that Django incorrectly handled certain\n URLs when the jango.views.static.serve() view is being used. A remote attacker\n could possibly use a Django server as an open redirect. (CVE-2017-7234)\");\n script_tag(name:\"affected\", value:\"python-django on Ubuntu 16.10,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3254-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3254-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|16\\.10|12\\.04 LTS|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n if ((res = isdpkgvuln(pkg:\"python-django\", ver:\"2.6.11-0ubuntu1.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"python-django\", ver:\"1.8.7-1ubuntu8.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python3-django\", ver:\"1.8.7-1ubuntu8.2\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"python-django\", ver:\"1.3.1-4ubuntu1.23\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"python-django\", ver:\"1.8.7-1ubuntu5.5\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python3-django\", ver:\"1.8.7-1ubuntu5.5\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-01-29T20:07:31", "description": ", #859516\n\nIt was discovered that there were two vulnerabilities in python-django, a\nhigh-level Python web development framework.\n\nCVE-2017-7233 (#859515): Open redirect and possible XSS attack via\nuser-supplied numeric redirect URLs. Django relies on user input in some cases\n(e.g. django.contrib.auth.views.login() and i18n) to redirect the user to an\n", "cvss3": {}, "published": "2018-01-17T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for python-django (DLA-885-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7234", "CVE-2017-7233"], "modified": "2020-01-29T00:00:00", "id": "OPENVAS:1361412562310890885", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310890885", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.890885\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2017-7233\", \"CVE-2017-7234\");\n script_name(\"Debian LTS: Security Advisory for python-django (DLA-885-1)\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-01-17 00:00:00 +0100 (Wed, 17 Jan 2018)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2017/04/msg00004.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n\n script_tag(name:\"affected\", value:\"python-django on Debian Linux\");\n\n script_tag(name:\"solution\", value:\"For Debian 7 'Wheezy', this issue has been fixed in python-django version\n1.4.22-1+deb7u3.\n\nWe recommend that you upgrade your python-django packages.\");\n\n script_tag(name:\"summary\", value:\", #859516\n\nIt was discovered that there were two vulnerabilities in python-django, a\nhigh-level Python web development framework.\n\nCVE-2017-7233 (#859515): Open redirect and possible XSS attack via\nuser-supplied numeric redirect URLs. Django relies on user input in some cases\n(e.g. django.contrib.auth.views.login() and i18n) to redirect the user to an\n'on success' URL. The security check for these redirects (namely is_safe_url())\nconsidered some numeric URLs (e.g. http:999999999) 'safe' when they shouldn't\nbe. Also, if a developer relied on is_safe_url() to provide safe redirect\ntargets and puts such a URL into a link, they could suffer from an XSS attack.\n\nCVE-2017-7234 (#895516): Open redirect vulnerability in\ndjango.views.static.serve. A maliciously crafted URL to a Django site using the\nserve() view could redirect to any other domain. The view no longer does any\nredirects as they don't provide any known, useful functionality.\");\n\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"python-django\", ver:\"1.4.22-1+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-django-doc\", ver:\"1.4.22-1+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2017-07-24T12:57:25", "description": "Several vulnerabilities were discovered in Django, a high-level Python\nweb development framework. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-9013 \nMarti Raudsepp reported that a user with a hardcoded password is\ncreated when running tests with an Oracle database.\n\nCVE-2016-9014 \nAymeric Augustin discovered that Django does not properly validate\nthe Host header against settings.ALLOWED_HOSTS when the debug\nsetting is enabled. A remote attacker can take advantage of this\nflaw to perform DNS rebinding attacks.\n\nCVE-2017-7233 \nIt was discovered that is_safe_url() does not properly handle\ncertain numeric URLs as safe. A remote attacker can take advantage\nof this flaw to perform XSS attacks or to use a Django server as an\nopen redirect.\n\nCVE-2017-7234 \nPhithon from Chaitin Tech discovered an open redirect vulnerability\nin the django.views.static.serve() view. Note that this view is not\nintended for production use.", "cvss3": {}, "published": "2017-04-26T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3835-1 (python-django - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-9013", "CVE-2017-7234", "CVE-2016-9014", "CVE-2017-7233"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703835", "href": "http://plugins.openvas.org/nasl.php?oid=703835", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3835.nasl 6607 2017-07-07 12:04:25Z cfischer $\n# Auto-generated from advisory DSA 3835-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703835);\n script_version(\"$Revision: 6607 $\");\n script_cve_id(\"CVE-2016-9013\", \"CVE-2016-9014\", \"CVE-2017-7233\", \"CVE-2017-7234\");\n script_name(\"Debian Security Advisory DSA 3835-1 (python-django - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:04:25 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2017-04-26 00:00:00 +0200 (Wed, 26 Apr 2017)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2017/dsa-3835.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"python-django on Debian Linux\");\n script_tag(name: \"insight\", value: \"Django is a high-level web application framework that loosely follows the\nmodel-view-controller design pattern.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 1.7.11-1+deb8u2.\n\nWe recommend that you upgrade your python-django packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities were discovered in Django, a high-level Python\nweb development framework. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-9013 \nMarti Raudsepp reported that a user with a hardcoded password is\ncreated when running tests with an Oracle database.\n\nCVE-2016-9014 \nAymeric Augustin discovered that Django does not properly validate\nthe Host header against settings.ALLOWED_HOSTS when the debug\nsetting is enabled. A remote attacker can take advantage of this\nflaw to perform DNS rebinding attacks.\n\nCVE-2017-7233 \nIt was discovered that is_safe_url() does not properly handle\ncertain numeric URLs as safe. A remote attacker can take advantage\nof this flaw to perform XSS attacks or to use a Django server as an\nopen redirect.\n\nCVE-2017-7234 \nPhithon from Chaitin Tech discovered an open redirect vulnerability\nin the django.views.static.serve() view. Note that this view is not\nintended for production use.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"python-django\", ver:\"1.7.11-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-django-common\", ver:\"1.7.11-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-django-doc\", ver:\"1.7.11-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python3-django\", ver:\"1.7.11-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:34:08", "description": "Several vulnerabilities were discovered in Django, a high-level Python\nweb development framework. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-9013\nMarti Raudsepp reported that a user with a hardcoded password is\ncreated when running tests with an Oracle database.\n\nCVE-2016-9014\nAymeric Augustin discovered that Django does not properly validate\nthe Host header against settings.ALLOWED_HOSTS when the debug\nsetting is enabled. A remote attacker can take advantage of this\nflaw to perform DNS rebinding attacks.\n\nCVE-2017-7233\nIt was discovered that is_safe_url() does not properly handle\ncertain numeric URLs as safe. A remote attacker can take advantage\nof this flaw to perform XSS attacks or to use a Django server as an\nopen redirect.\n\nCVE-2017-7234\nPhithon from Chaitin Tech discovered an open redirect vulnerability\nin the django.views.static.serve() view. Note that this view is not\nintended for production use.", "cvss3": {}, "published": "2017-04-26T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3835-1 (python-django - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-9013", "CVE-2017-7234", "CVE-2016-9014", "CVE-2017-7233"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703835", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703835", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3835.nasl 14280 2019-03-18 14:50:45Z cfischer $\n# Auto-generated from advisory DSA 3835-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703835\");\n script_version(\"$Revision: 14280 $\");\n script_cve_id(\"CVE-2016-9013\", \"CVE-2016-9014\", \"CVE-2017-7233\", \"CVE-2017-7234\");\n script_name(\"Debian Security Advisory DSA 3835-1 (python-django - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:50:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-26 00:00:00 +0200 (Wed, 26 Apr 2017)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2017/dsa-3835.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"python-django on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), these problems have been fixed in\nversion 1.7.11-1+deb8u2.\n\nWe recommend that you upgrade your python-django packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities were discovered in Django, a high-level Python\nweb development framework. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-9013\nMarti Raudsepp reported that a user with a hardcoded password is\ncreated when running tests with an Oracle database.\n\nCVE-2016-9014\nAymeric Augustin discovered that Django does not properly validate\nthe Host header against settings.ALLOWED_HOSTS when the debug\nsetting is enabled. A remote attacker can take advantage of this\nflaw to perform DNS rebinding attacks.\n\nCVE-2017-7233\nIt was discovered that is_safe_url() does not properly handle\ncertain numeric URLs as safe. A remote attacker can take advantage\nof this flaw to perform XSS attacks or to use a Django server as an\nopen redirect.\n\nCVE-2017-7234\nPhithon from Chaitin Tech discovered an open redirect vulnerability\nin the django.views.static.serve() view. Note that this view is not\nintended for production use.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"python-django\", ver:\"1.7.11-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"python-django-common\", ver:\"1.7.11-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"python-django-doc\", ver:\"1.7.11-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"python3-django\", ver:\"1.7.11-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "osv": [{"lastseen": "2022-06-10T04:59:11", "description": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2019-01-04T17:50:26", "type": "osv", "title": "Moderate severity vulnerability that affects django", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2022-06-10T02:16:14", "id": "OSV:GHSA-37HP-765X-J95X", "href": "https://osv.dev/vulnerability/GHSA-37hp-765x-j95x", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-05-12T01:09:33", "description": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2017-04-04T17:59:00", "type": "osv", "title": "PYSEC-2017-9", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2021-07-05T00:01:20", "id": "OSV:PYSEC-2017-9", "href": "https://osv.dev/vulnerability/PYSEC-2017-9", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "cve": [{"lastseen": "2022-03-23T18:34:29", "description": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2017-04-04T17:59:00", "type": "cve", "title": "CVE-2017-7233", "cwe": ["CWE-601"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2018-10-17T10:29:00", "cpe": ["cpe:/a:djangoproject:django:1.10.2", "cpe:/a:djangoproject:django:1.8.13", "cpe:/a:djangoproject:django:1.9.10", "cpe:/a:djangoproject:django:1.9.2", "cpe:/a:djangoproject:django:1.8.6", "cpe:/a:djangoproject:django:1.10.4", "cpe:/a:djangoproject:django:1.8.12", "cpe:/a:djangoproject:django:1.8.0", "cpe:/a:djangoproject:django:1.8.5", "cpe:/a:djangoproject:django:1.8.4", "cpe:/a:djangoproject:django:1.9.3", "cpe:/a:djangoproject:django:1.10.5", "cpe:/a:djangoproject:django:1.9.9", "cpe:/a:djangoproject:django:1.8.1", "cpe:/a:djangoproject:django:1.9.6", "cpe:/a:djangoproject:django:1.8.11", "cpe:/a:djangoproject:django:1.9.11", "cpe:/a:djangoproject:django:1.8.16", "cpe:/a:djangoproject:django:1.10.3", "cpe:/a:djangoproject:django:1.10.0", "cpe:/a:djangoproject:django:1.9.7", "cpe:/a:djangoproject:django:1.8.14", "cpe:/a:djangoproject:django:1.8.9", "cpe:/a:djangoproject:django:1.10.6", "cpe:/a:djangoproject:django:1.8.10", "cpe:/a:djangoproject:django:1.8.17", "cpe:/a:djangoproject:django:1.8.2", "cpe:/a:djangoproject:django:1.9.4", "cpe:/a:djangoproject:django:1.10.1", "cpe:/a:djangoproject:django:1.9.12", "cpe:/a:djangoproject:django:1.9.8", "cpe:/a:djangoproject:django:1.8.7", "cpe:/a:djangoproject:django:1.8.8", "cpe:/a:djangoproject:django:1.9.1", "cpe:/a:djangoproject:django:1.8.15", "cpe:/a:djangoproject:django:1.9", "cpe:/a:djangoproject:django:1.8.3", "cpe:/a:djangoproject:django:1.9.5"], "id": "CVE-2017-7233", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7233", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:a:djangoproject:django:1.9:a1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.0:b1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.0:a1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.0:b1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.16:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.17:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.0:c1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9:rc2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.0:b2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9:b1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.0:a1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*"]}], "myhack58": [{"lastseen": "2017-04-14T01:32:30", "edition": 2, "description": "! [](/Article/UploadPic/2017-4/201741434638176. png? www. myhack58. com) \nDjango official News&Event in the 4 on 4, released a security update that fixes two URL jump loopholes, one is the urlparse pot, the other by long Dinh tech security researcher phithon report, are very beautiful. Because there are replicate Django vulnerability of habit, the evening pumping up the time to reproduce it. Interesting point kinda. The two vulnerability analysis together, scrape together the article. \nCVE-2017-7233 analysis \u2014 Django is_safe_url() the URL to jump to the filter function of the Bypass \nForeign security researcher roks0n provided to the Django official of a vulnerability. \nOn is_safe_url function \nDjango comes with a function: django. utils. http. is_safe_url(url, host=None, allowed_hosts=None, require_https=False) for filtering the need for the jump of the url. If the url is safe then return ture, insecurity, false is returned. The document is as follows: \nprint(is_safe_url.__ doc__) \nReturn `True` if the url is a safe redirection (i.e. it doesn't point to \na different host and uses a safe scheme). \nAlways returns `False` on an empty url. \nIf `require_https` is `True`, only 'https' will be considered a valid \nscheme, as opposed to 'http' and 'https' with the default, `False`. \nLet's look at the conventional of the several usages: \nfrom django. utils. http import is_safe_url \nIn [2]: is_safe_url('http://baidu.com') \nOut[2]: False \nIn [3]: is_safe_url('baidu.com') \nOut[3]: True \nIn [5]: is_safe_url('aaaaa') \nOut[5]: True \nIn [8]: is_safe_url('//blog.neargle.com') \nOut[8]: False \nIn [7]: is_safe_url('http://google.com/adadadadad','blog.neargle.com') \nOut[7]: False \nIn [13]: is_safe_url('http://blog.neargle.com/aaaa/bbb', 'blog.neargle.com') \nOut[13]: True \nVisible in the absence of the designated second parameter of the host case,the url if the non-relative path, i.e., the HttpResponseRedirect function will jump to another site, the is_safe_url it is determined that it is unsafe url,\u5982\u679c \u6307\u5b9a \u4e86 host \u4e3a blog.neargle.com then is_safe_url will determine whether the url belongs to the\u2019blog.neargle.com\u2019if the url is\u2019blog.neargle.com\u2019or the relative path of the url, it is determined that the url is safe. \nurllib. parse. urlparse special case \nThe problem lies in the function of the domain name and the method of determination is based on urllib. parse. urlparse,source code is as follows(the django/utils/http.py): \ndef _is_safe_url(url, host): \nif url. startswith('///'): \nreturn False \nurl_info = urlparse(url) \nif not url_info. netloc and url_info. scheme: \nreturn False \nif unicodedata. category(url[0])[0] == 'C': \nreturn False \nreturn ((not url_info. netloc or url_info. netloc == host) and \n(not url_info. scheme or url_info. the scheme in ['http', 'https'])) \nWe take a look at the urlparse conventional usage and several urlparse unable to handle the special case. \n>>> urlparse('http://blog.neargle.com/2017/01/09/chrome-ext-spider-for-probe/') \nParseResult(scheme='http', netloc='blog.neargle.com', path='/2017/01/09/ chrome-ext-spider-for-probe/', params=\", query=\", fragment=\") \n>>> urlparse('ftp:99999999') \nParseResult(scheme=\", netloc=\", path='ftp:99999999', params=\", query=\", fragment=\") \n>>> urlparse('http:99999999') \nParseResult(scheme='http', netloc=\", path='99999999', params=\", query=\", fragment=\") \n>>> urlparse('https:99999999') \nParseResult(scheme=\", netloc=\", path='https:99999999', params=\", query=\", fragment=\") \n>>> urlparse('javascript:222222') \nParseResult(scheme=\", netloc=\", path='javascript:222222', params=\", query=\", fragment=\") \n>>> urlparse('ftp:aaaaaaa') \nParseResult(scheme='ftp', netloc=\", path='aaaaaaa', params=\", query=\", fragment=\") \n>>> urlparse('ftp:127.0.0.1') \nParseResult(scheme='ftp', netloc=\", path='127.0.0.1', params=\", query=\", fragment=\") \n>>> urlparse('ftp:127.0.0.1') \nParseResult(scheme='ftp', netloc=\", path='127.0.0.1', params=\", query=\", fragment=\") \nCan be found when the scheme is not equal to http, and the path is purely digital,urlparse processing, for example, aaaa:2222222223 the case is not properly divided, will all return to the path. In this case url_info. netloc == url_info. scheme = = \"\"then((not url_info. netloc or url_info. netloc == host) and (not url_info. scheme or url_info. the scheme in ['http', 'https']))is true. Here, incidentally,django official News&Event mentioned in the poc:\u201dhttp:99999999\u201dis unable to bypass, in front of the judge if not url_info. netloc and url_info. scheme:it can not.\uff09 For example, the following situations: \n>>> is_safe_url('http:555555555') \nFalse \n>>> is_safe_url('ftp:23333333333') \nTrue \n>>> is_safe_url('https:2333333333') \nTrue \nThe use of IP Decimal Bypass is_safe_url \nBut since it is a url jump vulnerability, we need to make a jump to the specified url, https:2333333333\u8fd9\u6837\u7684url\u660e\u663e\u662f\u65e0\u6cd5\u8bbf\u95ee\u7684 and colon must be followed by pure digital,http:127.0.0.1 \u662f \u65e0\u6cd5 pypass \u7684 the. What method? In fact, ip is not only the common dotted decimal notation,a decimal number can also represent an ip address,the browser is also supported. For example: 127.0.0.1 == 2130706433, 8.8.8.8 == 134744072(Converter:http://www. ipaddressguide. com/ip),and'http:2130706433'is on the browser can access to the corresponding ip and services, i.e.'http:2130706433 = http://127.0.0.1/' the. \n\n\n**[1] [[2]](<85230_2.htm>) [[3]](<85230_3.htm>) [Next](<85230_2.htm>)**", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-14T00:00:00", "type": "myhack58", "title": "Django two url jump vulnerability analysis: CVE-2017-7233&7234-vulnerability warning-the black bar safety net", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2017-04-14T00:00:00", "href": "http://www.myhack58.com/Article/html/3/62/2017/85230.htm", "id": "MYHACK58:62201785230", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}], "nessus": [{"lastseen": "2022-06-16T16:27:10", "description": "fix CVE-2017-7233\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2017-07-17T00:00:00", "type": "nessus", "title": "Fedora 26 : python-django (2017-f997e46fa7)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7233"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-django", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2017-F997E46FA7.NASL", "href": "https://www.tenable.com/plugins/nessus/101750", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-f997e46fa7.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(101750);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-7233\");\n script_xref(name:\"FEDORA\", value:\"2017-f997e46fa7\");\n\n script_name(english:\"Fedora 26 : python-django (2017-f997e46fa7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"fix CVE-2017-7233\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-f997e46fa7\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-django package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-django\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"python-django-1.10.7-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-django\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-06-16T16:19:01", "description": "update to 1.9.13, fix for CVE-2017-7233\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2017-04-24T00:00:00", "type": "nessus", "title": "Fedora 25 : python-django (2017-c0ef6054d7)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7233"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-django", "cpe:/o:fedoraproject:fedora:25"], "id": "FEDORA_2017-C0EF6054D7.NASL", "href": "https://www.tenable.com/plugins/nessus/99613", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-c0ef6054d7.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99613);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-7233\");\n script_xref(name:\"FEDORA\", value:\"2017-c0ef6054d7\");\n\n script_name(english:\"Fedora 25 : python-django (2017-c0ef6054d7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"update to 1.9.13, fix for CVE-2017-7233\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-c0ef6054d7\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-django package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-django\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"python-django-1.9.13-1.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-django\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-06-16T16:19:05", "description": "It was discovered that there were two vulnerabilities in python-django, a high-level Python web development framework.\n\nCVE-2017-7233 (#859515): Open redirect and possible XSS attack via user-supplied numeric redirect URLs. Django relies on user input in some cases (e.g. django.contrib.auth.views.login() and i18n) to redirect the user to an 'on success' URL. The security check for these redirects (namely is_safe_url()) considered some numeric URLs (e.g.\nhttp:999999999) 'safe' when they shouldn't be. Also, if a developer relied on is_safe_url() to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.\n\nCVE-2017-7234 (#895516): Open redirect vulnerability in django.views.static.serve; A maliciously crafted URL to a Django site using the serve() view could redirect to any other domain. The view no longer does any redirects as they don't provide any known, useful functionality.\n\nFor Debian 7 'Wheezy', this issue has been fixed in python-django version 1.4.22-1+deb7u3.\n\nWe recommend that you upgrade your python-django packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2017-04-06T00:00:00", "type": "nessus", "title": "Debian DLA-885-1 : python-django security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:python-django", "p-cpe:/a:debian:debian_linux:python-django-doc", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DLA-885.NASL", "href": "https://www.tenable.com/plugins/nessus/99202", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-885-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99202);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-7233\", \"CVE-2017-7234\");\n\n script_name(english:\"Debian DLA-885-1 : python-django security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that there were two vulnerabilities in\npython-django, a high-level Python web development framework.\n\nCVE-2017-7233 (#859515): Open redirect and possible XSS attack via\nuser-supplied numeric redirect URLs. Django relies on user input in\nsome cases (e.g. django.contrib.auth.views.login() and i18n) to\nredirect the user to an 'on success' URL. The security check for these\nredirects (namely is_safe_url()) considered some numeric URLs (e.g.\nhttp:999999999) 'safe' when they shouldn't be. Also, if a developer\nrelied on is_safe_url() to provide safe redirect targets and puts such\na URL into a link, they could suffer from an XSS attack.\n\nCVE-2017-7234 (#895516): Open redirect vulnerability in\ndjango.views.static.serve; A maliciously crafted URL to a Django site\nusing the serve() view could redirect to any other domain. The view no\nlonger does any redirects as they don't provide any known, useful\nfunctionality.\n\nFor Debian 7 'Wheezy', this issue has been fixed in python-django\nversion 1.4.22-1+deb7u3.\n\nWe recommend that you upgrade your python-django packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2017/04/msg00004.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/python-django\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Upgrade the affected python-django, and python-django-doc packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-django-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"python-django\", reference:\"1.4.22-1+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"python-django-doc\", reference:\"1.4.22-1+deb7u3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-06-16T16:20:03", "description": "Django team reports :\n\nThese release addresses two security issues detailed below. We encourage all users of Django to upgrade as soon as possible.\n\n- Open redirect and possible XSS attack via user-supplied numeric redirect URLs\n\n- Open redirect vulnerability in django.views.static.serve()", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2017-04-05T00:00:00", "type": "nessus", "title": "FreeBSD : django -- multiple vulnerabilities (dc880d6c-195d-11e7-8c63-0800277dcc69)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:py27-django", "p-cpe:/a:freebsd:freebsd:py27-django110", "p-cpe:/a:freebsd:freebsd:py27-django18", "p-cpe:/a:freebsd:freebsd:py27-django19", "p-cpe:/a:freebsd:freebsd:py33-django", "p-cpe:/a:freebsd:freebsd:py33-django110", "p-cpe:/a:freebsd:freebsd:py33-django18", "p-cpe:/a:freebsd:freebsd:py33-django19", "p-cpe:/a:freebsd:freebsd:py34-django", "p-cpe:/a:freebsd:freebsd:py34-django110", "p-cpe:/a:freebsd:freebsd:py34-django18", "p-cpe:/a:freebsd:freebsd:py34-django19", "p-cpe:/a:freebsd:freebsd:py35-django", "p-cpe:/a:freebsd:freebsd:py35-django110", "p-cpe:/a:freebsd:freebsd:py35-django18", "p-cpe:/a:freebsd:freebsd:py35-django19", "p-cpe:/a:freebsd:freebsd:py36-django", "p-cpe:/a:freebsd:freebsd:py36-django110", "p-cpe:/a:freebsd:freebsd:py36-django18", "p-cpe:/a:freebsd:freebsd:py36-django19", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_DC880D6C195D11E78C630800277DCC69.NASL", "href": "https://www.tenable.com/plugins/nessus/99193", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99193);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-7233\", \"CVE-2017-7234\");\n\n script_name(english:\"FreeBSD : django -- multiple vulnerabilities (dc880d6c-195d-11e7-8c63-0800277dcc69)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Django team reports :\n\nThese release addresses two security issues detailed below. We\nencourage all users of Django to upgrade as soon as possible.\n\n- Open redirect and possible XSS attack via user-supplied numeric\nredirect URLs\n\n- Open redirect vulnerability in django.views.static.serve()\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.djangoproject.com/weblog/2017/apr/04/security-releases/\"\n );\n # https://vuxml.freebsd.org/freebsd/dc880d6c-195d-11e7-8c63-0800277dcc69.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?38ddf117\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py27-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py27-django110\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py27-django18\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py27-django19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py33-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py33-django110\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py33-django18\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py33-django19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py34-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py34-django110\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py34-django18\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py34-django19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py35-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py35-django110\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py35-django18\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py35-django19\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py36-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py36-django110\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py36-django18\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py36-django19\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"py27-django<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py33-django<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py34-django<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py35-django<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py36-django<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py27-django18<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py33-django18<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py34-django18<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py35-django18<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py36-django18<1.8.18\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py27-django19<1.9.13\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py33-django19<1.9.13\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py34-django19<1.9.13\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py35-django19<1.9.13\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py36-django19<1.9.13\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py27-django110<1.10.7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py33-django110<1.10.7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py34-django110<1.10.7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py35-django110<1.10.7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py36-django110<1.10.7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-06-16T16:19:30", "description": "It was discovered that Django incorrectly handled numeric redirect URLs. A remote attacker could possibly use this issue to perform XSS attacks, and to use a Django server as an open redirect.\n(CVE-2017-7233)\n\nPhithon Gong discovered that Django incorrectly handled certain URLs when the jango.views.static.serve() view is being used. A remote attacker could possibly use a Django server as an open redirect.\n(CVE-2017-7234).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2017-04-05T00:00:00", "type": "nessus", "title": "Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : python-django vulnerabilities (USN-3254-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2019-09-18T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:python-django", "p-cpe:/a:canonical:ubuntu_linux:python3-django", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:16.10"], "id": "UBUNTU_USN-3254-1.NASL", "href": "https://www.tenable.com/plugins/nessus/99195", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3254-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(99195);\n script_version(\"3.8\");\n script_cvs_date(\"Date: 2019/09/18 12:31:46\");\n\n script_cve_id(\"CVE-2017-7233\", \"CVE-2017-7234\");\n script_xref(name:\"USN\", value:\"3254-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : python-django vulnerabilities (USN-3254-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that Django incorrectly handled numeric redirect\nURLs. A remote attacker could possibly use this issue to perform XSS\nattacks, and to use a Django server as an open redirect.\n(CVE-2017-7233)\n\nPhithon Gong discovered that Django incorrectly handled certain URLs\nwhen the jango.views.static.serve() view is being used. A remote\nattacker could possibly use a Django server as an open redirect.\n(CVE-2017-7234).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3254-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-django and / or python3-django packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python3-django\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|14\\.04|16\\.04|16\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 14.04 / 16.04 / 16.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"python-django\", pkgver:\"1.3.1-4ubuntu1.23\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"python-django\", pkgver:\"1.6.11-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"python-django\", pkgver:\"1.8.7-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"python3-django\", pkgver:\"1.8.7-1ubuntu5.5\")) flag++;\nif (ubuntu_check(osver:\"16.10\", pkgname:\"python-django\", pkgver:\"1.8.7-1ubuntu8.2\")) flag++;\nif (ubuntu_check(osver:\"16.10\", pkgname:\"python3-django\", pkgver:\"1.8.7-1ubuntu8.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-django / python3-django\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-08-19T12:36:52", "description": "Several vulnerabilities were discovered in Django, a high-level Python web development framework. The Common Vulnerabilities and Exposures project identifies the following problems :\n\n - CVE-2016-9013 Marti Raudsepp reported that a user with a hard-coded password is created when running tests with an Oracle database.\n\n - CVE-2016-9014 Aymeric Augustin discovered that Django does not properly validate the Host header against settings.ALLOWED_HOSTS when the debug setting is enabled. A remote attacker can take advantage of this flaw to perform DNS rebinding attacks.\n\n - CVE-2017-7233 It was discovered that is_safe_url() does not properly handle certain numeric URLs as safe. A remote attacker can take advantage of this flaw to perform XSS attacks or to use a Django server as an open redirect.\n\n - CVE-2017-7234 Phithon from Chaitin Tech discovered an open redirect vulnerability in the django.views.static.serve() view.\n Note that this view is not intended for production use.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-04-27T00:00:00", "type": "nessus", "title": "Debian DSA-3835-1 : python-django - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-9013", "CVE-2016-9014", "CVE-2017-7233", "CVE-2017-7234"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:python-django", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3835.NASL", "href": "https://www.tenable.com/plugins/nessus/99695", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3835. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99695);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-9013\", \"CVE-2016-9014\", \"CVE-2017-7233\", \"CVE-2017-7234\");\n script_xref(name:\"DSA\", value:\"3835\");\n\n script_name(english:\"Debian DSA-3835-1 : python-django - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities were discovered in Django, a high-level Python\nweb development framework. The Common Vulnerabilities and Exposures\nproject identifies the following problems :\n\n - CVE-2016-9013\n Marti Raudsepp reported that a user with a hard-coded\n password is created when running tests with an Oracle\n database.\n\n - CVE-2016-9014\n Aymeric Augustin discovered that Django does not\n properly validate the Host header against\n settings.ALLOWED_HOSTS when the debug setting is\n enabled. A remote attacker can take advantage of this\n flaw to perform DNS rebinding attacks.\n\n - CVE-2017-7233\n It was discovered that is_safe_url() does not properly\n handle certain numeric URLs as safe. A remote attacker\n can take advantage of this flaw to perform XSS attacks\n or to use a Django server as an open redirect.\n\n - CVE-2017-7234\n Phithon from Chaitin Tech discovered an open redirect\n vulnerability in the django.views.static.serve() view.\n Note that this view is not intended for production use.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842856\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859516\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-9013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-9014\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-7233\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-7234\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/python-django\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-3835\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the python-django packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 1.7.11-1+deb8u2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-django\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"python-django\", reference:\"1.7.11-1+deb8u2\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-django-common\", reference:\"1.7.11-1+deb8u2\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-django-doc\", reference:\"1.7.11-1+deb8u2\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python3-django\", reference:\"1.7.11-1+deb8u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T16:40:09", "description": "This update for python-Django to version 1.18.18 fixes multiple issues. Security issues fixed :\n\n - CVE-2018-7537: Fixed catastrophic backtracking in django.utils.text.Truncator. (bsc#1083305)\n\n - CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc template filters (bsc#1083304).\n\n - CVE-2016-7401: CSRF protection bypass on a site with Google Analytics (bsc#1001374).\n\n - CVE-2016-2513: User enumeration through timing difference on password hasher work factor upgrade (bsc#968000).\n\n - CVE-2016-2512: Fixed malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth (bsc#967999).\n\n - CVE-2016-9013: User with hardcoded password created when running tests on Oracle (bsc#1008050).\n\n - CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047).\n\n - CVE-2017-7234: Open redirect vulnerability in django.views.static.serve() (bsc#1031451).\n\n - CVE-2017-7233: Open redirect and possible XSS attack via user-supplied numeric redirect URLs (bsc#1031450).\n\n - CVE-2017-12794: Fixed XSS possibility in traceback section of technical 500 debug page (bsc#1056284)", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-27T00:00:00", "type": "nessus", "title": "openSUSE Security Update : python-Django (openSUSE-2018-317)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2048", "CVE-2016-2512", "CVE-2016-2513", "CVE-2016-6186", "CVE-2016-7401", "CVE-2016-9013", "CVE-2016-9014", "CVE-2017-12794", "CVE-2017-7233", "CVE-2017-7234", "CVE-2018-7536", "CVE-2018-7537"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:python-Django", "cpe:/o:novell:opensuse:42.3"], "id": "OPENSUSE-2018-317.NASL", "href": "https://www.tenable.com/plugins/nessus/108640", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-317.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(108640);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-2048\", \"CVE-2016-2512\", \"CVE-2016-2513\", \"CVE-2016-6186\", \"CVE-2016-7401\", \"CVE-2016-9013\", \"CVE-2016-9014\", \"CVE-2017-12794\", \"CVE-2017-7233\", \"CVE-2017-7234\", \"CVE-2018-7536\", \"CVE-2018-7537\");\n\n script_name(english:\"openSUSE Security Update : python-Django (openSUSE-2018-317)\");\n script_summary(english:\"Check for the openSUSE-2018-317 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for python-Django to version 1.18.18 fixes multiple\nissues. Security issues fixed :\n\n - CVE-2018-7537: Fixed catastrophic backtracking in\n django.utils.text.Truncator. (bsc#1083305)\n\n - CVE-2018-7536: Fixed catastrophic backtracking in urlize\n and urlizetrunc template filters (bsc#1083304).\n\n - CVE-2016-7401: CSRF protection bypass on a site with\n Google Analytics (bsc#1001374).\n\n - CVE-2016-2513: User enumeration through timing\n difference on password hasher work factor upgrade\n (bsc#968000).\n\n - CVE-2016-2512: Fixed malicious redirect and possible XSS\n attack via user-supplied redirect URLs containing basic\n auth (bsc#967999).\n\n - CVE-2016-9013: User with hardcoded password created when\n running tests on Oracle (bsc#1008050).\n\n - CVE-2016-9014: DNS rebinding vulnerability when\n DEBUG=True (bsc#1008047).\n\n - CVE-2017-7234: Open redirect vulnerability in\n django.views.static.serve() (bsc#1031451).\n\n - CVE-2017-7233: Open redirect and possible XSS attack via\n user-supplied numeric redirect URLs (bsc#1031450).\n\n - CVE-2017-12794: Fixed XSS possibility in traceback\n section of technical 500 debug page (bsc#1056284)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1001374\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1008047\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1008050\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1031450\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1031451\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1056284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083305\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968000\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-Django package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-Django\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"python-Django-1.8.19-6.4.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-Django\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T16:36:17", "description": "This update for python3-Django to version 1.18.18 fixes multiple issues. Security issues fixed :\n\n - CVE-2018-7537: Fixed catastrophic backtracking in django.utils.text.Truncator. (bsc#1083305)\n\n - CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc template filters (bsc#1083304).\n\n - CVE-2016-7401: CSRF protection bypass on a site with Google Analytics (bsc#1001374).\n\n - CVE-2016-2513: User enumeration through timing difference on password hasher work factor upgrade (bsc#968000).\n\n - CVE-2016-2512: Fixed malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth (bsc#967999).\n\n - CVE-2016-9013: User with hardcoded password created when running tests on Oracle (bsc#1008050).\n\n - CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047).\n\n - CVE-2017-7234: Open redirect vulnerability in django.views.static.serve() (bsc#1031451).\n\n - CVE-2017-7233: Open redirect and possible XSS attack via user-supplied numeric redirect URLs (bsc#1031450).\n\n - CVE-2017-12794: Fixed XSS possibility in traceback section of technical 500 debug page (bsc#1056284)", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-27T00:00:00", "type": "nessus", "title": "openSUSE Security Update : python3-Django (openSUSE-2018-318)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-2048", "CVE-2016-2512", "CVE-2016-2513", "CVE-2016-6186", "CVE-2016-7401", "CVE-2016-9013", "CVE-2016-9014", "CVE-2017-12794", "CVE-2017-7233", "CVE-2017-7234", "CVE-2018-7536", "CVE-2018-7537"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:python3-Django", "cpe:/o:novell:opensuse:42.3"], "id": "OPENSUSE-2018-318.NASL", "href": "https://www.tenable.com/plugins/nessus/108641", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-318.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(108641);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-2048\", \"CVE-2016-2512\", \"CVE-2016-2513\", \"CVE-2016-6186\", \"CVE-2016-7401\", \"CVE-2016-9013\", \"CVE-2016-9014\", \"CVE-2017-12794\", \"CVE-2017-7233\", \"CVE-2017-7234\", \"CVE-2018-7536\", \"CVE-2018-7537\");\n\n script_name(english:\"openSUSE Security Update : python3-Django (openSUSE-2018-318)\");\n script_summary(english:\"Check for the openSUSE-2018-318 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for python3-Django to version 1.18.18 fixes multiple\nissues. Security issues fixed :\n\n - CVE-2018-7537: Fixed catastrophic backtracking in\n django.utils.text.Truncator. (bsc#1083305)\n\n - CVE-2018-7536: Fixed catastrophic backtracking in urlize\n and urlizetrunc template filters (bsc#1083304).\n\n - CVE-2016-7401: CSRF protection bypass on a site with\n Google Analytics (bsc#1001374).\n\n - CVE-2016-2513: User enumeration through timing\n difference on password hasher work factor upgrade\n (bsc#968000).\n\n - CVE-2016-2512: Fixed malicious redirect and possible XSS\n attack via user-supplied redirect URLs containing basic\n auth (bsc#967999).\n\n - CVE-2016-9013: User with hardcoded password created when\n running tests on Oracle (bsc#1008050).\n\n - CVE-2016-9014: DNS rebinding vulnerability when\n DEBUG=True (bsc#1008047).\n\n - CVE-2017-7234: Open redirect vulnerability in\n django.views.static.serve() (bsc#1031451).\n\n - CVE-2017-7233: Open redirect and possible XSS attack via\n user-supplied numeric redirect URLs (bsc#1031450).\n\n - CVE-2017-12794: Fixed XSS possibility in traceback\n section of technical 500 debug page (bsc#1056284)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1001374\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1008047\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1008050\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1031450\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1031451\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1056284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083305\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=968000\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python3-Django package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python3-Django\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"python3-Django-1.8.19-5.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python3-Django\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T16:31:52", "description": "An update is now available for Red Hat Satellite 6.4 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nRed Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool.\n\nSecurity Fix(es) :\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* hornetq: XXE/SSRF in XPath selector (CVE-2015-3208)\n\n* bouncycastle: Information disclosure in GCMBlockCipher (CVE-2015-6644)\n\n* bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data (CVE-2016-1000338)\n\n* bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339)\n\n* bouncycastle: Information exposure in DSA signature generation via timing attack (CVE-2016-1000341)\n\n* bouncycastle: ECDSA improper validation of ASN.1 encoding of signature (CVE-2016-1000342)\n\n* bouncycastle: DHIES implementation allowed the use of ECB mode (CVE-2016-1000344)\n\n* bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack (CVE-2016-1000345)\n\n* bouncycastle: Other party DH public keys are not fully validated (CVE-2016-1000346)\n\n* bouncycastle: ECIES implementation allowed the use of ECB mode (CVE-2016-1000352)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs (CVE-2017-7233)\n\n* hibernate-validator: Privilege escalation when running under the security manager (CVE-2017-7536)\n\n* puppet: Environment leakage in puppet-agent (CVE-2017-10690)\n\n* Satellite 6: XSS in discovery rule filter autocomplete functionality (CVE-2017-12175)\n\n* foreman: Stored XSS in fact name or value (CVE-2017-15100)\n\n* pulp: sensitive credentials revealed through the API (CVE-2018-1090)\n\n* foreman: SQL injection due to improper handling of the widget id parameter (CVE-2018-1096)\n\n* foreman: Ovirt admin password exposed by foreman API (CVE-2018-1097)\n\n* django: Catastrophic backtracking in regular expressions via 'urlize' and 'urlizetrunc' (CVE-2018-7536)\n\n* django: Catastrophic backtracking in regular expressions via 'truncatechars_html' and 'truncatewords_html' (CVE-2018-7537)\n\n* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service (CVE-2018-10237)\n\n* bouncycastle: Carry propagation bug in math.raw.Nat??? class (CVE-2016-1000340)\n\n* bouncycastle: DSA key pair generator generates a weak private key by default (CVE-2016-1000343)\n\n* puppet: Unpacking of tarballs in tar/mini.rb can create files with insecure permissions (CVE-2017-10689)\n\n* bouncycastle: BKS-V1 keystore files vulnerable to trivial hash collisions (CVE-2018-5382)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-15095; and the Django project for reporting CVE-2017-7233, CVE-2018-7536, and CVE-2018-7537. The CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); and the CVE-2018-1096 issue was discovered by Martin Povolny (Red Hat). Red Hat would also like to thank David Jorm (IIX Product Security) for reporting CVE-2015-3208.\n\nAdditional Changes :\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these changes is available from the Release Notes document linked to in the References section.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-10-18T00:00:00", "type": "nessus", "title": "RHEL 7 : Satellite Server (RHSA-2018:2927)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-3208", "CVE-2015-6644", "CVE-2016-1000338", "CVE-2016-1000339", "CVE-2016-1000340", "CVE-2016-1000341", "CVE-2016-1000342", "CVE-2016-1000343", "CVE-2016-1000344", "CVE-2016-1000345", "CVE-2016-1000346", "CVE-2016-1000352", "CVE-2017-10689", "CVE-2017-10690", "CVE-2017-12175", "CVE-2017-15095", "CVE-2017-15100", "CVE-2017-5929", "CVE-2017-7233", "CVE-2017-7525", "CVE-2017-7536", "CVE-2018-10237", "CVE-2018-1090", "CVE-2018-1096", "CVE-2018-1097", "CVE-2018-5382", "CVE-2018-7536", "CVE-2018-7537"], "modified": "2022-02-08T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:SOAPpy", "p-cpe:/a:redhat:enterprise_linux:ansiblerole-insights-client", "p-cpe:/a:redhat:enterprise_linux:candlepin", "p-cpe:/a:redhat:enterprise_linux:candlepin-selinux", "p-cpe:/a:redhat:enterprise_linux:createrepo_c", "p-cpe:/a:redhat:enterprise_linux:createrepo_c-debuginfo", "p-cpe:/a:redhat:enterprise_linux:createrepo_c-libs", "p-cpe:/a:redhat:enterprise_linux:foreman", "p-cpe:/a:redhat:enterprise_linux:foreman-bootloaders-redhat", "p-cpe:/a:redhat:enterprise_linux:foreman-bootloaders-redhat-tftpboot", "p-cpe:/a:redhat:enterprise_linux:foreman-cli", "p-cpe:/a:redhat:enterprise_linux:foreman-compute", "p-cpe:/a:redhat:enterprise_linux:foreman-debug", "p-cpe:/a:redhat:enterprise_linux:foreman-ec2", "p-cpe:/a:redhat:enterprise_linux:foreman-gce", "p-cpe:/a:redhat:enterprise_linux:foreman-installer", "p-cpe:/a:redhat:enterprise_linux:foreman-installer-katello", "p-cpe:/a:redhat:enterprise_linux:foreman-journald", "p-cpe:/a:redhat:enterprise_linux:foreman-libvirt", "p-cpe:/a:redhat:enterprise_linux:foreman-openstack", "p-cpe:/a:redhat:enterprise_linux:foreman-ovirt", "p-cpe:/a:redhat:enterprise_linux:foreman-postgresql", "p-cpe:/a:redhat:enterprise_linux:foreman-proxy", "p-cpe:/a:redhat:enterprise_linux:foreman-proxy-content", "p-cpe:/a:redhat:enterprise_linux:foreman-rackspace", "p-cpe:/a:redhat:enterprise_linux:foreman-selinux", "p-cpe:/a:redhat:enterprise_linux:foreman-telemetry", "p-cpe:/a:redhat:enterprise_linux:foreman-vmware", "p-cpe:/a:redhat:enterprise_linux:hfsplus-tools", "p-cpe:/a:redhat:enterprise_linux:hfsplus-tools-debuginfo", "p-cpe:/a:redhat:enterprise_linux:katello", "p-cpe:/a:redhat:enterprise_linux:katello-certs-tools", "p-cpe:/a:redhat:enterprise_linux:katello-client-bootstrap", "p-cpe:/a:redhat:enterprise_linux:katello-common", "p-cpe:/a:redhat:enterprise_linux:katello-debug", "p-cpe:/a:redhat:enterprise_linux:katello-installer-base", "p-cpe:/a:redhat:enterprise_linux:katello-selinux", "p-cpe:/a:redhat:enterprise_linux:katello-service", "p-cpe:/a:redhat:enterprise_linux:kobo", "p-cpe:/a:redhat:enterprise_linux:libwebsockets", "p-cpe:/a:redhat:enterprise_linux:libwebsockets-debuginfo", "p-cpe:/a:redhat:enterprise_linux:liquibase", "p-cpe:/a:redhat:enterprise_linux:livecd-tools", "p-cpe:/a:redhat:enterprise_linux:mod_passenger", "p-cpe:/a:redhat:enterprise_linux:mod_xsendfile", "p-cpe:/a:redhat:enterprise_linux:mod_xsendfile-debuginfo", "p-cpe:/a:redhat:enterprise_linux:ostree", "p-cpe:/a:redhat:enterprise_linux:ostree-debuginfo", "p-cpe:/a:redhat:enterprise_linux:pcp-mmvstatsd", "p-cpe:/a:redhat:enterprise_linux:pulp-admin-client", "p-cpe:/a:redhat:enterprise_linux:pulp-docker-admin-extensions", "p-cpe:/a:redhat:enterprise_linux:pulp-docker-plugins", "p-cpe:/a:redhat:enterprise_linux:pulp-katello", "p-cpe:/a:redhat:enterprise_linux:pulp-maintenance", "p-cpe:/a:redhat:enterprise_linux:pulp-ostree-admin-extensions", "p-cpe:/a:redhat:enterprise_linux:pulp-ostree-plugins", "p-cpe:/a:redhat:enterprise_linux:pulp-puppet-admin-extensions", "p-cpe:/a:redhat:enterprise_linux:pulp-puppet-plugins", "p-cpe:/a:redhat:enterprise_linux:pulp-puppet-tools", "p-cpe:/a:redhat:enterprise_linux:pulp-rpm-admin-extensions", "p-cpe:/a:redhat:enterprise_linux:pulp-rpm-plugins", "p-cpe:/a:redhat:enterprise_linux:pulp-selinux", "p-cpe:/a:redhat:enterprise_linux:pulp-server", "p-cpe:/a:redhat:enterprise_linux:puppet-agent", "p-cpe:/a:redhat:enterprise_linux:puppet-agent-oauth", "p-cpe:/a:redhat:enterprise_linux:puppet-foreman_scap_client", "p-cpe:/a:redhat:enterprise_linux:puppetlabs-stdlib", "p-cpe:/a:redhat:enterprise_linux:puppetserver", "p-cpe:/a:redhat:enterprise_linux:python-billiard-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-blinker", "p-cpe:/a:redhat:enterprise_linux:python-bson", "p-cpe:/a:redhat:enterprise_linux:python-crane", "p-cpe:/a:redhat:enterprise_linux:python-flask", "p-cpe:/a:redhat:enterprise_linux:python-fpconst", "p-cpe:/a:redhat:enterprise_linux:python-gnupg", "p-cpe:/a:redhat:enterprise_linux:python-gofer", "p-cpe:/a:redhat:enterprise_linux:python-gofer-qpid", "p-cpe:/a:redhat:enterprise_linux:python-imgcreate", "p-cpe:/a:redhat:enterprise_linux:python-isodate", "p-cpe:/a:redhat:enterprise_linux:python-itsdangerous", "p-cpe:/a:redhat:enterprise_linux:python-jinja2", "p-cpe:/a:redhat:enterprise_linux:python-kid", "p-cpe:/a:redhat:enterprise_linux:python-mongoengine", "p-cpe:/a:redhat:enterprise_linux:python-nectar", "p-cpe:/a:redhat:enterprise_linux:python-oauth2", "p-cpe:/a:redhat:enterprise_linux:python-okaara", "p-cpe:/a:redhat:enterprise_linux:python-pulp-bindings", "p-cpe:/a:redhat:enterprise_linux:python-pulp-client-lib", "p-cpe:/a:redhat:enterprise_linux:python-pulp-common", "p-cpe:/a:redhat:enterprise_linux:python-pulp-docker-common", "p-cpe:/a:redhat:enterprise_linux:python-pulp-integrity", "p-cpe:/a:redhat:enterprise_linux:python-pulp-oid_validation", "p-cpe:/a:redhat:enterprise_linux:python-pulp-ostree-common", "p-cpe:/a:redhat:enterprise_linux:python-pulp-puppet-common", "p-cpe:/a:redhat:enterprise_linux:python-pulp-repoauth", "p-cpe:/a:redhat:enterprise_linux:python-pulp-rpm-common", "p-cpe:/a:redhat:enterprise_linux:python-pulp-streamer", "p-cpe:/a:redhat:enterprise_linux:python-pymongo", "p-cpe:/a:redhat:enterprise_linux:python-pymongo-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-pymongo-gridfs", "p-cpe:/a:redhat:enterprise_linux:python-qpid", "p-cpe:/a:redhat:enterprise_linux:python-qpid-proton", "p-cpe:/a:redhat:enterprise_linux:python-qpid-qmf", "p-cpe:/a:redhat:enterprise_linux:python-saslwrapper", "p-cpe:/a:redhat:enterprise_linux:python-semantic_version", "p-cpe:/a:redhat:enterprise_linux:python-simplejson", "p-cpe:/a:redhat:enterprise_linux:python-simplejson-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-twisted-core", "p-cpe:/a:redhat:enterprise_linux:python-twisted-core-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-twisted-web", "p-cpe:/a:redhat:enterprise_linux:python-werkzeug", "p-cpe:/a:redhat:enterprise_linux:python-zope-interface", "p-cpe:/a:redhat:enterprise_linux:python-zope-interface-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python2-amqp", "p-cpe:/a:redhat:enterprise_linux:python2-billiard", "p-cpe:/a:redhat:enterprise_linux:python2-celery", "p-cpe:/a:redhat:enterprise_linux:python2-django", "p-cpe:/a:redhat:enterprise_linux:python2-kombu", "p-cpe:/a:redhat:enterprise_linux:python2-vine", "p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client", "p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client-devel", "p-cpe:/a:redhat:enterprise_linux:qpid-cpp-debuginfo", "p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server", "p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-linearstore", "p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-debuginfo", "p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-router", "p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-tools", "p-cpe:/a:redhat:enterprise_linux:qpid-proton-c", "p-cpe:/a:redhat:enterprise_linux:qpid-proton-debuginfo", "p-cpe:/a:redhat:enterprise_linux:qpid-qmf", "p-cpe:/a:redhat:enterprise_linux:qpid-tools", "p-cpe:/a:redhat:enterprise_linux:redhat-access-insights-puppet", "p-cpe:/a:redhat:enterprise_linux:repoview", "p-cpe:/a:redhat:enterprise_linux:rubygem-ansi", "p-cpe:/a:redhat:enterprise_linux:rubygem-bundler_ext", "p-cpe:/a:redhat:enterprise_linux:rubygem-clamp", "p-cpe:/a:redhat:enterprise_linux:rubygem-concurrent-ruby", "p-cpe:/a:redhat:enterprise_linux:rubygem-facter", "p-cpe:/a:redhat:enterprise_linux:rubygem-fast_gettext", "p-cpe:/a:redhat:enterprise_linux:rubygem-ffi", "p-cpe:/a:redhat:enterprise_linux:rubygem-ffi-debuginfo", "p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_scap_client", "p-cpe:/a:redhat:enterprise_linux:rubygem-gssapi", "p-cpe:/a:redhat:enterprise_linux:rubygem-hashie", "p-cpe:/a:redhat:enterprise_linux:rubygem-highline", "p-cpe:/a:redhat:enterprise_linux:rubygem-kafo", "p-cpe:/a:redhat:enterprise_linux:rubygem-kafo_parsers", "p-cpe:/a:redhat:enterprise_linux:rubygem-kafo_wizards", "p-cpe:/a:redhat:enterprise_linux:rubygem-little-plugger", "p-cpe:/a:redhat:enterprise_linux:rubygem-logging", "p-cpe:/a:redhat:enterprise_linux:rubygem-mime-types", "p-cpe:/a:redhat:enterprise_linux:rubygem-multi_json", "p-cpe:/a:redhat:enterprise_linux:rubygem-netrc", "p-cpe:/a:redhat:enterprise_linux:rubygem-newt", "p-cpe:/a:redhat:enterprise_linux:rubygem-newt-debuginfo", "p-cpe:/a:redhat:enterprise_linux:rubygem-oauth", "p-cpe:/a:redhat:enterprise_linux:rubygem-openscap", "p-cpe:/a:redhat:enterprise_linux:rubygem-passenger", "p-cpe:/a:redhat:enterprise_linux:rubygem-passenger-debuginfo", "p-cpe:/a:redhat:enterprise_linux:rubygem-passenger-native", "p-cpe:/a:redhat:enterprise_linux:rubygem-passenger-native-libs", "p-cpe:/a:redhat:enterprise_linux:rubygem-powerbar", "p-cpe:/a:redhat:enterprise_linux:rubygem-rake", "p-cpe:/a:redhat:enterprise_linux:rubygem-rb-inotify", "p-cpe:/a:redhat:enterprise_linux:rubygem-rest-client", "p-cpe:/a:redhat:enterprise_linux:rubygem-rkerberos", "p-cpe:/a:redhat:enterprise_linux:rubygem-rkerberos-debuginfo", "p-cpe:/a:redhat:enterprise_linux:rubygem-rsec", "p-cpe:/a:redhat:enterprise_linux:rubygem-rubyipmi", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_ansible", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_dhcp_remote_isc", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_discovery", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_discovery_image", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_dynflow", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_openscap", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_pulp", "p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_remote_execution_ssh", "p-cpe:/a:redhat:enterprise_linux:rubygem-tilt", "p-cpe:/a:redhat:enterprise_linux:saslwrapper", "p-cpe:/a:redhat:enterprise_linux:saslwrapper-debuginfo", "p-cpe:/a:redhat:enterprise_linux:satellite", "p-cpe:/a:redhat:enterprise_linux:satellite-capsule", "p-cpe:/a:redhat:enterprise_linux:satellite-cli", "p-cpe:/a:redhat:enterprise_linux:satellite-common", "p-cpe:/a:redhat:enterprise_linux:satellite-debug-tools", "p-cpe:/a:redhat:enterprise_linux:satellite-installer", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actioncable", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actionmailer", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actionpack", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actionview", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activejob", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activemodel", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activerecord", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activesupport", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-arel", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-builder", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-coffee-rails", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-coffee-script", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-coffee-script-source", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-concurrent-ruby", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-crass", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-erubi", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-execjs", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-globalid", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-i18n", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-loofah", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mail", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-method_source", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mime-types", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mime-types-data", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mini_mime", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-multi_json", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mustermann", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nio4r", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nio4r-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nokogiri", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nokogiri-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rack", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rack-protection", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rack-test", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rails", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rails-dom-testing", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rails-html-sanitizer", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-railties", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sinatra", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sprockets", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sprockets-rails", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sqlite3", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sqlite3-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-thor", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-thread_safe", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-tilt", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-turbolinks", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-tzinfo", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-websocket-driver", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-websocket-driver-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-websocket-extensions", "p-cpe:/a:redhat:enterprise_linux:tfm-ror51-runtime", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-activerecord-session_store", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-addressable", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-algebrick", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ancestry", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-anemone", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-angular-rails-templates", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-apipie-bindings", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-apipie-params", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-apipie-rails", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-audited", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-autoparse", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-awesome_print", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-bastion", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-bundler_ext", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-clamp", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-concurrent-ruby-edge", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-css_parser", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-daemons", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-deacon", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-deep_cloneable", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-deface", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-diffy", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-docker-api", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-domain_name", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-dynflow", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-excon", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-extlib", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-facter", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-faraday", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fast_gettext", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ffi", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ffi-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-aws", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-core", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-digitalocean", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-google", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-json", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-libvirt", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-openstack", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-ovirt", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-rackspace", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-vsphere", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-xenserver", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-xml", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman-redhat_access", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman-tasks", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman-tasks-core", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_ansible", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_ansible_core", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_bootdisk", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_discovery", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_docker", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_hooks", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_openscap", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_remote_execution", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_remote_execution_core", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_templates", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_theme_satellite", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_virt_who_configure", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-formatador", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-friendly_id", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-get_process_mem", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-gettext_i18n_rails", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-git", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-google-api-client", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-gssapi", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_csv", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_admin", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_ansible", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_bootdisk", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_discovery", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_docker", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_openscap", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_remote_execution", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_tasks", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_templates", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_virt_who_configure", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_katello", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hashie", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-highline", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-http-cookie", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ipaddress", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-jgrep", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-journald-logger", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-journald-native", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-journald-native-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-jwt", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-katello", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-launchy", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ldap_fluff", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-little-plugger", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-locale", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-logging", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-logging-journald", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-multipart-post", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ldap", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ping", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-scp", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ssh", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ssh-krb", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-netrc", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-oauth", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ovirt-engine-sdk", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ovirt-engine-sdk-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ovirt_provision_plugin", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-parse-cron", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger-native", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger-native-libs", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-pg", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-pg-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-polyglot", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-powerbar", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-prometheus-client", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-qpid_messaging", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-qpid_messaging-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-quantile", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rabl", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rack-jsonp", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rails-i18n", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rainbow", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rbovirt", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rbvmomi", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-record_tag_helper", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-redhat_access", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-redhat_access_lib", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-responders", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rest-client", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-retriable", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-roadie", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-roadie-rails", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-robotex", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby-libvirt", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby-libvirt-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby2ruby", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby_parser", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-runcible", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-safemode", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-scoped_search", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-secure_headers", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-sequel", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-sexp_processor", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-signet", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-smart_proxy_dynflow_core", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-sshkey", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-statsd-instrument", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-trollop", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unf", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unf_ext", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unf_ext-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unicode", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unicode-debuginfo", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unicode-display_width", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-useragent", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-validates_lengths_from_database", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-webpack-rails", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-wicked", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-will_paginate", "p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-x-editable-rails", "p-cpe:/a:redhat:enterprise_linux:tfm-runtime", "cpe:/o:redhat:enterprise_linux:7"], "id": "REDHAT-RHSA-2018-2927.NASL", "href": "https://www.tenable.com/plugins/nessus/118185", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2927. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(118185);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\n \"CVE-2015-3208\",\n \"CVE-2015-6644\",\n \"CVE-2016-1000338\",\n \"CVE-2016-1000339\",\n \"CVE-2016-1000340\",\n \"CVE-2016-1000341\",\n \"CVE-2016-1000342\",\n \"CVE-2016-1000343\",\n \"CVE-2016-1000344\",\n \"CVE-2016-1000345\",\n \"CVE-2016-1000346\",\n \"CVE-2016-1000352\",\n \"CVE-2017-5929\",\n \"CVE-2017-7233\",\n \"CVE-2017-7536\",\n \"CVE-2017-10689\",\n \"CVE-2017-10690\",\n \"CVE-2017-12175\",\n \"CVE-2017-15095\",\n \"CVE-2017-15100\",\n \"CVE-2018-1090\",\n \"CVE-2018-1096\",\n \"CVE-2018-1097\",\n \"CVE-2018-5382\",\n \"CVE-2018-7536\",\n \"CVE-2018-7537\",\n \"CVE-2018-10237\"\n );\n script_xref(name:\"RHSA\", value:\"2018:2927\");\n\n script_name(english:\"RHEL 7 : Satellite Server (RHSA-2018:2927)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update is now available for Red Hat Satellite 6.4 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nRed Hat Satellite is a systems management tool for Linux-based\ninfrastructure. It allows for provisioning, remote management, and\nmonitoring of multiple Linux deployments with a single centralized\ntool.\n\nSecurity Fix(es) :\n\n* jackson-databind: Unsafe deserialization due to incomplete black\nlist (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* hornetq: XXE/SSRF in XPath selector (CVE-2015-3208)\n\n* bouncycastle: Information disclosure in GCMBlockCipher\n(CVE-2015-6644)\n\n* bouncycastle: DSA does not fully validate ASN.1 encoding during\nsignature verification allowing for injection of unsigned data\n(CVE-2016-1000338)\n\n* bouncycastle: Information leak in AESFastEngine class\n(CVE-2016-1000339)\n\n* bouncycastle: Information exposure in DSA signature generation via\ntiming attack (CVE-2016-1000341)\n\n* bouncycastle: ECDSA improper validation of ASN.1 encoding of\nsignature (CVE-2016-1000342)\n\n* bouncycastle: DHIES implementation allowed the use of ECB mode\n(CVE-2016-1000344)\n\n* bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle\nattack (CVE-2016-1000345)\n\n* bouncycastle: Other party DH public keys are not fully validated\n(CVE-2016-1000346)\n\n* bouncycastle: ECIES implementation allowed the use of ECB mode\n(CVE-2016-1000352)\n\n* logback: Serialization vulnerability in SocketServer and\nServerSocketReceiver (CVE-2017-5929)\n\n* python-django: Open redirect and possible XSS attack via\nuser-supplied numeric redirect URLs (CVE-2017-7233)\n\n* hibernate-validator: Privilege escalation when running under the\nsecurity manager (CVE-2017-7536)\n\n* puppet: Environment leakage in puppet-agent (CVE-2017-10690)\n\n* Satellite 6: XSS in discovery rule filter autocomplete functionality\n(CVE-2017-12175)\n\n* foreman: Stored XSS in fact name or value (CVE-2017-15100)\n\n* pulp: sensitive credentials revealed through the API (CVE-2018-1090)\n\n* foreman: SQL injection due to improper handling of the widget id\nparameter (CVE-2018-1096)\n\n* foreman: Ovirt admin password exposed by foreman API (CVE-2018-1097)\n\n* django: Catastrophic backtracking in regular expressions via\n'urlize' and 'urlizetrunc' (CVE-2018-7536)\n\n* django: Catastrophic backtracking in regular expressions via\n'truncatechars_html' and 'truncatewords_html' (CVE-2018-7537)\n\n* guava: Unbounded memory allocation in AtomicDoubleArray and\nCompoundOrdering classes allow remote attackers to cause a denial of\nservice (CVE-2018-10237)\n\n* bouncycastle: Carry propagation bug in math.raw.Nat??? class\n(CVE-2016-1000340)\n\n* bouncycastle: DSA key pair generator generates a weak private key by\ndefault (CVE-2016-1000343)\n\n* puppet: Unpacking of tarballs in tar/mini.rb can create files with\ninsecure permissions (CVE-2017-10689)\n\n* bouncycastle: BKS-V1 keystore files vulnerable to trivial hash\ncollisions (CVE-2018-5382)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank Liao Xinxi (NSFOCUS) for reporting\nCVE-2017-15095; and the Django project for reporting CVE-2017-7233,\nCVE-2018-7536, and CVE-2018-7537. The CVE-2017-7536 issue was\ndiscovered by Gunnar Morling (Red Hat); and the CVE-2018-1096 issue\nwas discovered by Martin Povolny (Red Hat). Red Hat would also like to\nthank David Jorm (IIX Product Security) for reporting CVE-2015-3208.\n\nAdditional Changes :\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these changes is available from the Release Notes\ndocument linked to in the References section.\");\n # https://access.redhat.com/documentation/en-us/red_hat_satellite/6.4/html/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?68e28b4d\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2018:2927\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2015-3208\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2015-6644\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000338\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000339\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000340\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000341\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000346\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2016-1000352\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-5929\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-7233\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-7536\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-10689\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-10690\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-12175\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-15095\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2017-15100\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2018-1090\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2018-1096\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2018-1097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2018-5382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2018-7536\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2018-7537\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/cve-2018-10237\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-5382\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/01/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/10/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/10/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:SOAPpy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ansiblerole-insights-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:candlepin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:candlepin-selinux\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:createrepo_c\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:createrepo_c-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:createrepo_c-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-bootloaders-redhat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-bootloaders-redhat-tftpboot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-compute\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-gce\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-installer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-installer-katello\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-journald\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-openstack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-ovirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-proxy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-proxy-content\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-rackspace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-selinux\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-telemetry\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:foreman-vmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:hfsplus-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:hfsplus-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello-certs-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello-client-bootstrap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello-installer-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello-selinux\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:katello-service\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kobo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libwebsockets\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libwebsockets-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:liquibase\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:livecd-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mod_passenger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mod_xsendfile\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mod_xsendfile-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ostree\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ostree-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pcp-mmvstatsd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-admin-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-docker-admin-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-docker-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-katello\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-maintenance\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-ostree-admin-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-ostree-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-puppet-admin-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-puppet-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-puppet-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-rpm-admin-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-rpm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-selinux\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pulp-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:puppet-agent\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:puppet-agent-oauth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:puppet-foreman_scap_client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:puppetlabs-stdlib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:puppetserver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-billiard-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-blinker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-bson\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-crane\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-flask\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-fpconst\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-gnupg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-gofer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-gofer-qpid\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-imgcreate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-isodate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-itsdangerous\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-jinja2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-kid\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-mongoengine\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-nectar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-oauth2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-okaara\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-bindings\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-client-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-docker-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-integrity\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-oid_validation\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-ostree-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-puppet-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-repoauth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-rpm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pulp-streamer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pymongo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pymongo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pymongo-gridfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-qpid\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-qpid-proton\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-qpid-qmf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-saslwrapper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-semantic_version\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-simplejson\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-simplejson-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-twisted-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-twisted-core-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-twisted-web\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-werkzeug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-zope-interface\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-zope-interface-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-amqp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-billiard\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-celery\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-django\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-kombu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-vine\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-cpp-client-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-cpp-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-cpp-server-linearstore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-router\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-dispatch-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-proton-c\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-proton-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-qmf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qpid-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-access-insights-puppet\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:repoview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-ansi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-bundler_ext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-clamp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-concurrent-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-facter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-fast_gettext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-ffi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-ffi-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_scap_client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-gssapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-hashie\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-highline\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-kafo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-kafo_parsers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-kafo_wizards\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-little-plugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-logging\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-mime-types\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-multi_json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-netrc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-newt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-newt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-oauth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-openscap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-passenger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-passenger-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-passenger-native\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-passenger-native-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-powerbar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rake\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rb-inotify\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rest-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rkerberos\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rkerberos-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rsec\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rubyipmi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_ansible\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_dhcp_remote_isc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_discovery\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_discovery_image\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_dynflow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_openscap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_pulp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_remote_execution_ssh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-tilt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:saslwrapper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:saslwrapper-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:satellite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:satellite-capsule\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:satellite-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:satellite-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:satellite-debug-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:satellite-installer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actioncable\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actionmailer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actionpack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-actionview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activejob\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activemodel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activerecord\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-activesupport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-arel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-builder\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-coffee-rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-coffee-script\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-coffee-script-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-concurrent-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-crass\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-erubi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-execjs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-globalid\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-i18n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-loofah\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-method_source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mime-types\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mime-types-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mini_mime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-multi_json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-mustermann\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nio4r\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nio4r-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nokogiri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-nokogiri-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rack-protection\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rack-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rails-dom-testing\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-rails-html-sanitizer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-railties\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sinatra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sprockets\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sprockets-rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sqlite3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-sqlite3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-thor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-thread_safe\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-tilt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-turbolinks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-tzinfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-websocket-driver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-websocket-driver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-rubygem-websocket-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-ror51-runtime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-activerecord-session_store\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-addressable\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-algebrick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ancestry\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-anemone\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-angular-rails-templates\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-apipie-bindings\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-apipie-params\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-apipie-rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-audited\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-autoparse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-awesome_print\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-bastion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-bundler_ext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-clamp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-concurrent-ruby-edge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-css_parser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-daemons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-deacon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-deep_cloneable\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-deface\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-diffy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-docker-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-domain_name\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-dynflow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-excon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-extlib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-facter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-faraday\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fast_gettext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ffi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ffi-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-digitalocean\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-google\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-openstack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-ovirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-rackspace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-vsphere\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-xenserver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-fog-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman-redhat_access\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman-tasks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman-tasks-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_ansible\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_ansible_core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_bootdisk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_discovery\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_docker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_hooks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_openscap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_remote_execution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_remote_execution_core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_templates\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_theme_satellite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-foreman_virt_who_configure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-formatador\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-friendly_id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-get_process_mem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-gettext_i18n_rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-git\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-google-api-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-gssapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_csv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_admin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_ansible\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_bootdisk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_discovery\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_docker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_openscap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_remote_execution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_tasks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_templates\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_foreman_virt_who_configure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hammer_cli_katello\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-hashie\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-highline\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-http-cookie\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ipaddress\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-jgrep\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-journald-logger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-journald-native\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-journald-native-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-jwt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-katello\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-launchy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ldap_fluff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-little-plugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-logging\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-logging-journald\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-multipart-post\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ping\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-scp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ssh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-net-ssh-krb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-netrc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-oauth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ovirt-engine-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ovirt-engine-sdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ovirt_provision_plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-parse-cron\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger-native\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-passenger-native-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-pg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-pg-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-polyglot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-powerbar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-prometheus-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-qpid_messaging\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-qpid_messaging-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-quantile\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rabl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rack-jsonp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rails-i18n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rainbow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rbovirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rbvmomi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-record_tag_helper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-redhat_access\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-redhat_access_lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-responders\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-rest-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-retriable\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-roadie\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-roadie-rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-robotex\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby-libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby-libvirt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby2ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-ruby_parser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-runcible\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-safemode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-scoped_search\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-secure_headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-sequel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-sexp_processor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-signet\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-smart_proxy_dynflow_core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-sshkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-statsd-instrument\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-trollop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unf_ext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unf_ext-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unicode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unicode-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-unicode-display_width\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-useragent\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-validates_lengths_from_database\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-webpack-rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-wicked\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-will_paginate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-rubygem-x-editable-rails\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:tfm-runtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:2927\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n\n if (! (rpm_exists(release:\"RHEL7\", rpm:\"katello-agent-3.3\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Satellite Server\");\n\n if (rpm_check(release:\"RHEL7\", reference:\"SOAPpy-0.11.6-17.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"ansiblerole-insights-client-1.5-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"candlepin-2.4.8-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"candlepin-selinux-2.4.8-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"createrepo_c-0.7.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"createrepo_c-debuginfo-0.7.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"createrepo_c-libs-0.7.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-bootloaders-redhat-201801241201-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-bootloaders-redhat-tftpboot-201801241201-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-cli-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-compute-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-debug-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-ec2-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-gce-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-installer-1.18.0.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-installer-katello-3.7.0.10-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-journald-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-libvirt-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-openstack-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-ovirt-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-postgresql-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-proxy-1.18.0.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-proxy-content-3.7.0-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-rackspace-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-selinux-1.18.0.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-telemetry-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"foreman-vmware-1.18.0.37-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"hfsplus-tools-332.14-12.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"hfsplus-tools-debuginfo-332.14-12.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-3.7.0-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-certs-tools-2.4.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-client-bootstrap-1.6.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-common-3.7.0-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-debug-3.7.0-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-installer-base-3.7.0.10-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-selinux-3.0.3-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"katello-service-3.7.0-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"kobo-0.5.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libwebsockets-2.1.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libwebsockets-debuginfo-2.1.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"liquibase-3.1.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"livecd-tools-20.4-1.6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"mod_passenger-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"mod_xsendfile-0.12-10.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"mod_xsendfile-debuginfo-0.12-10.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"ostree-2017.1-2.atomic.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"ostree-debuginfo-2017.1-2.atomic.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pcp-mmvstatsd-0.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-admin-client-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-docker-admin-extensions-3.1.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-docker-plugins-3.1.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-katello-1.0.2-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-maintenance-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-ostree-admin-extensions-1.3.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-ostree-plugins-1.3.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-puppet-admin-extensions-2.16.4-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-puppet-plugins-2.16.4-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-puppet-tools-2.16.4-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-rpm-admin-extensions-2.16.4.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-rpm-plugins-2.16.4.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-selinux-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"pulp-server-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"puppet-agent-5.5.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"puppet-agent-oauth-0.5.1-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"puppet-foreman_scap_client-0.3.16-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"puppetlabs-stdlib-4.2.1-1.20140510git08b00d9.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"puppetserver-5.3.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-billiard-debuginfo-3.5.0.3-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-blinker-1.3-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-bson-3.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-crane-3.1.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-flask-0.10.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-fpconst-0.7.3-12.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-gnupg-0.3.7-1.el7ui\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-gofer-2.12.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-gofer-qpid-2.12.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-imgcreate-20.4-1.6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-isodate-0.5.0-5.pulp.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-itsdangerous-0.23-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-jinja2-2.7.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-kid-0.9.6-11.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-mongoengine-0.10.5-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-nectar-1.5.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-oauth2-1.5.211-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-okaara-1.0.32-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-bindings-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-client-lib-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-common-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-docker-common-3.1.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-integrity-2.16.4.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-oid_validation-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-ostree-common-1.3.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-puppet-common-2.16.4-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-repoauth-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-rpm-common-2.16.4.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-pulp-streamer-2.16.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-pymongo-3.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-pymongo-debuginfo-3.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-pymongo-gridfs-3.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-qpid-1.35.0-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-qpid-proton-0.16.0-12.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-qpid-qmf-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-saslwrapper-0.22-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-semantic_version-2.2.0-6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-simplejson-3.2.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-simplejson-debuginfo-3.2.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-twisted-core-12.2.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-twisted-core-debuginfo-12.2.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-twisted-web-12.1.0-5.el7_2\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python-werkzeug-0.9.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-zope-interface-4.0.5-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-zope-interface-debuginfo-4.0.5-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python2-amqp-2.2.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python2-billiard-3.5.0.3-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python2-celery-4.0.2-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python2-django-1.11.11-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python2-kombu-4.0.2-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"python2-vine-1.1.3-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-cpp-client-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-cpp-client-devel-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-cpp-debuginfo-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-cpp-server-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-cpp-server-linearstore-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-dispatch-debuginfo-0.8.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-dispatch-router-0.8.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-dispatch-tools-0.8.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-proton-c-0.16.0-12.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-proton-debuginfo-0.16.0-12.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qpid-qmf-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"qpid-tools-1.36.0-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"redhat-access-insights-puppet-0.0.9-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"repoview-0.6.6-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-ansi-1.4.3-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-bundler_ext-0.4.1-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-clamp-1.1.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-concurrent-ruby-1.0.3-6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-facter-2.4.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-fast_gettext-1.1.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-ffi-1.4.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-ffi-debuginfo-1.4.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-foreman_scap_client-0.3.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-gssapi-1.1.2-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-hashie-2.0.5-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-highline-1.7.8-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-kafo-2.1.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-kafo_parsers-0.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-kafo_wizards-0.0.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-little-plugger-1.1.3-22.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-logging-2.2.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-mime-types-1.19-7.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-multi_json-1.12.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-netrc-0.7.7-9.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-newt-0.9.6-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-newt-debuginfo-0.9.6-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-oauth-0.5.4-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-openscap-0.4.7-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-passenger-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-passenger-debuginfo-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-passenger-native-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-passenger-native-libs-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-powerbar-1.0.17-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-rake-0.9.2.2-41.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-rb-inotify-0.9.7-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-rest-client-1.6.7-7.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-rkerberos-0.1.3-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-rkerberos-debuginfo-0.1.3-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-rsec-0.4.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-rubyipmi-0.10.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_ansible-2.0.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_dhcp_remote_isc-0.0.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_discovery-1.0.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_discovery_image-1.0.9-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_dynflow-0.2.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_openscap-0.6.11-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_pulp-1.3.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-smart_proxy_remote_execution_ssh-0.2.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-tilt-1.3.7-2.git.0.3b416c9.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"saslwrapper-0.22-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"saslwrapper-debuginfo-0.22-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"satellite-6.4.0-15.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"satellite-capsule-6.4.0-15.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"satellite-cli-6.4.0-15.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"satellite-common-6.4.0-15.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"satellite-debug-tools-6.4.0-15.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"satellite-installer-6.4.0.7-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-actioncable-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-actionmailer-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-actionpack-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-actionview-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-activejob-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-activemodel-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-activerecord-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-activesupport-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-arel-8.0.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-builder-3.2.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-coffee-rails-4.2.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-coffee-script-2.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-coffee-script-source-1.12.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-concurrent-ruby-1.0.5-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-crass-1.0.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-erubi-1.7.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-execjs-2.7.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-globalid-0.4.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-i18n-0.9.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-loofah-2.1.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-mail-2.7.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-method_source-0.9.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-mime-types-3.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-mime-types-data-3.2016.0521-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-mini_mime-1.0.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-multi_json-1.12.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-mustermann-1.0.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-nio4r-2.1.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-nio4r-debuginfo-2.1.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-nokogiri-1.8.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-nokogiri-debuginfo-1.8.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-rack-2.0.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-rack-protection-2.0.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-rack-test-0.7.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-rails-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-rails-dom-testing-2.0.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-rails-html-sanitizer-1.0.3-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-railties-5.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-sinatra-2.0.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-sprockets-3.7.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-sprockets-rails-3.2.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-sqlite3-1.3.13-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-sqlite3-debuginfo-1.3.13-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-thor-0.20.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-thread_safe-0.3.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-tilt-2.0.8-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-turbolinks-2.5.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-tzinfo-1.2.4-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-websocket-driver-0.6.5-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-rubygem-websocket-driver-debuginfo-0.6.5-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-ror51-rubygem-websocket-extensions-0.1.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-ror51-runtime-1.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-activerecord-session_store-1.1.0-6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-addressable-2.3.6-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-algebrick-0.7.3-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-ancestry-3.0.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-anemone-0.7.2-19.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-angular-rails-templates-1.0.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-apipie-bindings-0.2.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-apipie-params-0.0.5-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-apipie-rails-0.5.7-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-audited-4.7.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-autoparse-0.3.3-9.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-awesome_print-1.8.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-bastion-6.1.11-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-bundler_ext-0.4.1-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-clamp-1.1.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-concurrent-ruby-edge-0.2.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-css_parser-1.4.7-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-daemons-1.2.3-6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-deacon-1.0.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-deep_cloneable-2.2.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-deface-1.2.0-10.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-diffy-3.0.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-docker-api-1.28.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-domain_name-0.5.20160310-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-dynflow-1.0.5.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-excon-0.58.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-extlib-0.9.16-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-facter-2.4.0-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-faraday-0.9.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fast_gettext-1.4.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-ffi-1.4.0-11.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-ffi-debuginfo-1.4.0-11.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-1.42.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-aws-1.3.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-core-1.45.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-digitalocean-0.3.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-google-0.1.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-json-1.0.2-9.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-libvirt-0.4.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-openstack-0.1.25-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-ovirt-1.1.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-rackspace-0.1.4-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-vsphere-2.3.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-xenserver-0.2.3-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-fog-xml-0.1.2-6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman-redhat_access-2.0.13-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman-tasks-0.13.4.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman-tasks-core-0.2.5-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_ansible-2.2.9-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_ansible_core-2.1.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_bootdisk-12.0.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_discovery-12.0.2.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_docker-4.1.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_hooks-0.3.14.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_openscap-0.10.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_remote_execution-1.5.6-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_remote_execution_core-1.1.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_templates-6.0.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_theme_satellite-2.0.1.11-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-foreman_virt_who_configure-0.2.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-formatador-0.2.1-10.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-friendly_id-5.1.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-get_process_mem-0.2.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-gettext_i18n_rails-1.2.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-git-1.2.5-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-google-api-client-0.8.2-10.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-gssapi-1.2.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli-0.13.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_csv-2.3.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman-0.13.2.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_admin-0.0.8-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_ansible-0.1.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_bootdisk-0.1.3.3-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_discovery-1.0.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_docker-0.0.6-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_openscap-0.1.6-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_remote_execution-0.1.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_tasks-0.0.12-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_templates-0.1.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.3-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hammer_cli_katello-0.13.4.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-hashie-2.0.5-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-highline-1.7.8-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-http-cookie-1.0.2-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-ipaddress-0.8.0-10.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-jgrep-1.3.3-11.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-journald-logger-2.0.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-journald-native-1.0.10-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-journald-native-debuginfo-1.0.10-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-jwt-1.2.0-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-katello-3.7.0.41-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-launchy-2.4.3-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-ldap_fluff-0.4.7-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-little-plugger-1.1.3-22.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-locale-2.0.9-12.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-logging-2.2.2-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-logging-journald-1.0.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-multipart-post-1.2.0-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-net-ldap-0.15.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-net-ping-2.0.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-net-scp-1.2.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-net-ssh-4.0.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-net-ssh-krb-0.4.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-netrc-0.11.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-oauth-0.5.4-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-ovirt-engine-sdk-4.2.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-ovirt-engine-sdk-debuginfo-4.2.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-ovirt_provision_plugin-1.0.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-parse-cron-0.1.4-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-passenger-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-passenger-debuginfo-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-passenger-native-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-passenger-native-libs-4.0.18-24.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-pg-0.21.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-pg-debuginfo-0.21.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-polyglot-0.3.5-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-powerbar-1.0.17-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-prometheus-client-0.7.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-qpid_messaging-1.36.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-qpid_messaging-debuginfo-1.36.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-quantile-0.2.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-rabl-0.13.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-rack-jsonp-1.3.1-6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-rails-i18n-5.0.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-rainbow-2.2.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-rbovirt-0.1.7-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-rbvmomi-1.10.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-record_tag_helper-1.0.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-redhat_access-2.1.6-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-redhat_access_lib-1.1.4-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-responders-2.4.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-rest-client-2.0.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-retriable-1.4.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-roadie-3.2.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-roadie-rails-1.2.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-robotex-1.0.0-20.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-ruby-libvirt-0.7.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-ruby-libvirt-debuginfo-0.7.0-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-ruby2ruby-2.4.0-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-ruby_parser-3.10.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-runcible-2.8.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-safemode-1.3.5-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-scoped_search-4.1.3-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-secure_headers-5.0.5-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-sequel-5.7.1-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-sexp_processor-4.10.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-signet-0.6.0-9.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-smart_proxy_dynflow_core-0.2.1-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-sshkey-1.9.0-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-statsd-instrument-2.1.4-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-trollop-2.1.2-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-unf-0.1.3-6.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-unf_ext-0.0.6-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-unf_ext-debuginfo-0.0.6-8.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-unicode-0.4.4.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-rubygem-unicode-debuginfo-0.4.4.1-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-unicode-display_width-1.0.5-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-useragent-0.16.8-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-validates_lengths_from_database-0.5.0-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-webpack-rails-0.9.8-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-wicked-1.3.2-1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-will_paginate-3.1.5-2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"tfm-rubygem-x-editable-rails-1.5.5-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"tfm-runtime-4.0-3.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SOAPpy / ansiblerole-insights-client / candlepin / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debiancve": [{"lastseen": "2022-06-16T14:47:12", "description": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2017-04-04T17:59:00", "type": "debiancve", "title": "CVE-2017-7233", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233"], "modified": "2017-04-04T17:59:00", "id": "DEBIANCVE:CVE-2017-7233", "href": "https://security-tracker.debian.org/tracker/CVE-2017-7233", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "archlinux": [{"lastseen": "2021-07-28T14:34:09", "description": "Arch Linux Security Advisory ASA-201704-2\n=========================================\n\nSeverity: Medium\nDate : 2017-04-06\nCVE-ID : CVE-2017-7233 CVE-2017-7234\nPackage : python-django\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-233\n\nSummary\n=======\n\nThe package python-django before version 1.11-1 is vulnerable to\nmultiple issues including cross-site scripting and open redirect.\n\nResolution\n==========\n\nUpgrade to 1.11-1.\n\n# pacman -Syu \"python-django>=1.11-1\"\n\nThe problems have been fixed upstream in version 1.11.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-7233 (cross-site scripting)\n\nDjango relies on user input in some cases (e.g.\ndjango.contrib.auth.views.login() and i18n) to redirect the user to an\n\u201con success\u201d URL. The security check for these redirects (namely\ndjango.utils.http.is_safe_url()) considered some numeric URLs (e.g.\nhttp:999999999) \u201csafe\u201d when they shouldn\u2019t be.\nAlso, if a developer relies on is_safe_url() to provide safe redirect\ntargets and puts such a URL into a link, they could suffer from an XSS\nattack.\n\n- CVE-2017-7234 (open redirect)\n\nA maliciously crafted URL to a Django site using the serve() view could\nredirect to any other domain. The view no longer does any redirects as\nthey don\u2019t provide any known, useful functionality.\nNote, however, that this view has always carried a warning that it is\nnot hardened for production use and should be used only as a\ndevelopment aid.\n\nImpact\n======\n\nA remote attacker is able to use a specially crafted numeric-URL to\nexecute arbitrary javascript on the client's machine and craft a\nmalious URL to a Django site which could redirect to any other domain.\n\nReferences\n==========\n\nhttps://docs.djangoproject.com/en/dev/releases/1.11\nhttps://security.archlinux.org/CVE-2017-7233\nhttps://security.archlinux.org/CVE-2017-7234", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-06T00:00:00", "type": "archlinux", "title": "[ASA-201704-2] python-django: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-06T00:00:00", "id": "ASA-201704-2", "href": "https://security.archlinux.org/ASA-201704-2", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-07-28T14:34:09", "description": "Arch Linux Security Advisory ASA-201704-1\n=========================================\n\nSeverity: Medium\nDate : 2017-04-06\nCVE-ID : CVE-2017-7233 CVE-2017-7234\nPackage : python2-django\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-233\n\nSummary\n=======\n\nThe package python2-django before version 1.11-1 is vulnerable to\nmultiple issues including cross-site scripting and open redirect.\n\nResolution\n==========\n\nUpgrade to 1.11-1.\n\n# pacman -Syu \"python2-django>=1.11-1\"\n\nThe problems have been fixed upstream in version 1.11.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-7233 (cross-site scripting)\n\nDjango relies on user input in some cases (e.g.\ndjango.contrib.auth.views.login() and i18n) to redirect the user to an\n\u201con success\u201d URL. The security check for these redirects (namely\ndjango.utils.http.is_safe_url()) considered some numeric URLs (e.g.\nhttp:999999999) \u201csafe\u201d when they shouldn\u2019t be.\nAlso, if a developer relies on is_safe_url() to provide safe redirect\ntargets and puts such a URL into a link, they could suffer from an XSS\nattack.\n\n- CVE-2017-7234 (open redirect)\n\nA maliciously crafted URL to a Django site using the serve() view could\nredirect to any other domain. The view no longer does any redirects as\nthey don\u2019t provide any known, useful functionality.\nNote, however, that this view has always carried a warning that it is\nnot hardened for production use and should be used only as a\ndevelopment aid.\n\nImpact\n======\n\nA remote attacker is able to use a specially crafted numeric-URL to\nexecute arbitrary javascript on the client's machine and craft a\nmalious URL to a Django site which could redirect to any other domain.\n\nReferences\n==========\n\nhttps://docs.djangoproject.com/en/dev/releases/1.11\nhttps://security.archlinux.org/CVE-2017-7233\nhttps://security.archlinux.org/CVE-2017-7234", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-06T00:00:00", "type": "archlinux", "title": "[ASA-201704-1] python2-django: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-06T00:00:00", "id": "ASA-201704-1", "href": "https://security.archlinux.org/ASA-201704-1", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "ubuntu": [{"lastseen": "2022-01-04T12:14:40", "description": "It was discovered that Django incorrectly handled numeric redirect URLs. A \nremote attacker could possibly use this issue to perform XSS attacks, and \nto use a Django server as an open redirect. (CVE-2017-7233)\n\nPhithon Gong discovered that Django incorrectly handled certain URLs when \nthe jango.views.static.serve() view is being used. A remote attacker could \npossibly use a Django server as an open redirect. (CVE-2017-7234)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-04T00:00:00", "type": "ubuntu", "title": "Django vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-04T00:00:00", "id": "USN-3254-1", "href": "https://ubuntu.com/security/notices/USN-3254-1", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "debian": [{"lastseen": "2021-12-02T16:21:28", "description": "Package : python-django\nVersion : 1.4.22-1+deb7u3\nCVE ID : CVE-2017-7233, CVE-2017-7234\nDebian Bug : #859515, #859516\n\nIt was discovered that there were two vulnerabilities in python-django, a\nhigh-level Python web development framework.\n\nCVE-2017-7233 (#859515): Open redirect and possible XSS attack via\nuser-supplied numeric redirect URLs. Django relies on user input in some cases\n(e.g. django.contrib.auth.views.login() and i18n) to redirect the user to an\n"on success" URL. The security check for these redirects (namely is_safe_url())\nconsidered some numeric URLs (e.g. http:999999999) "safe" when they shouldn't\nbe. Also, if a developer relied on is_safe_url() to provide safe redirect\ntargets and puts such a URL into a link, they could suffer from an XSS attack.\n\nCVE-2017-7234 (#895516): Open redirect vulnerability in\ndjango.views.static.serve; A maliciously crafted URL to a Django site using the\nserve() view could redirect to any other domain. The view no longer does any\nredirects as they don't provide any known, useful functionality.\n\nFor Debian 7 "Wheezy", this issue has been fixed in python-django version\n1.4.22-1+deb7u3.\n\nWe recommend that you upgrade your python-django packages.\n\n\nRegards,\n\n- -- \n ,''`.\n : :' : Chris Lamb\n `. `'` lamby@debian.org / chris-lamb.co.uk\n `-", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-05T09:07:04", "type": "debian", "title": "[SECURITY] [DLA 885-1] python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-05T09:07:04", "id": "DEBIAN:DLA-885-1:1F500", "href": "https://lists.debian.org/debian-lts-announce/2017/04/msg00004.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-02-16T12:26:49", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3835-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nApril 26, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : python-django\nCVE ID : CVE-2016-9013 CVE-2016-9014 CVE-2017-7233 CVE-2017-7234\nDebian Bug : 842856 859515 859516\n\nSeveral vulnerabilities were discovered in Django, a high-level Python\nweb development framework. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-9013\n\n Marti Raudsepp reported that a user with a hardcoded password is\n created when running tests with an Oracle database.\n\nCVE-2016-9014\n\n Aymeric Augustin discovered that Django does not properly validate\n the Host header against settings.ALLOWED_HOSTS when the debug\n setting is enabled. A remote attacker can take advantage of this\n flaw to perform DNS rebinding attacks.\n\nCVE-2017-7233\n\n It was discovered that is_safe_url() does not properly handle\n certain numeric URLs as safe. A remote attacker can take advantage\n of this flaw to perform XSS attacks or to use a Django server as an\n open redirect.\n\nCVE-2017-7234\n\n Phithon from Chaitin Tech discovered an open redirect vulnerability\n in the django.views.static.serve() view. Note that this view is not\n intended for production use.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.7.11-1+deb8u2.\n\nWe recommend that you upgrade your python-django packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-04-26T20:05:26", "type": "debian", "title": "[SECURITY] [DSA 3835-1] python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-9013", "CVE-2016-9014", "CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-26T20:05:26", "id": "DEBIAN:DSA-3835-1:2A1A9", "href": "https://lists.debian.org/debian-security-announce/2017/msg00094.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-21T22:03:42", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3835-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nApril 26, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : python-django\nCVE ID : CVE-2016-9013 CVE-2016-9014 CVE-2017-7233 CVE-2017-7234\nDebian Bug : 842856 859515 859516\n\nSeveral vulnerabilities were discovered in Django, a high-level Python\nweb development framework. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-9013\n\n Marti Raudsepp reported that a user with a hardcoded password is\n created when running tests with an Oracle database.\n\nCVE-2016-9014\n\n Aymeric Augustin discovered that Django does not properly validate\n the Host header against settings.ALLOWED_HOSTS when the debug\n setting is enabled. A remote attacker can take advantage of this\n flaw to perform DNS rebinding attacks.\n\nCVE-2017-7233\n\n It was discovered that is_safe_url() does not properly handle\n certain numeric URLs as safe. A remote attacker can take advantage\n of this flaw to perform XSS attacks or to use a Django server as an\n open redirect.\n\nCVE-2017-7234\n\n Phithon from Chaitin Tech discovered an open redirect vulnerability\n in the django.views.static.serve() view. Note that this view is not\n intended for production use.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.7.11-1+deb8u2.\n\nWe recommend that you upgrade your python-django packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-04-26T20:05:26", "type": "debian", "title": "[SECURITY] [DSA 3835-1] python-django security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-9013", "CVE-2016-9014", "CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-26T20:05:26", "id": "DEBIAN:DSA-3835-1:6CAEA", "href": "https://lists.debian.org/debian-security-announce/2017/msg00094.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:31", "description": "\n\nDjango team reports:\n\nThese release addresses two security issues detailed below. We\n\t encourage all users of Django to upgrade as soon as possible.\n\nOpen redirect and possible XSS attack via user-supplied numeric\n\t redirect URLs\nOpen redirect vulnerability in django.views.static.serve()\n\n\n\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-04-04T00:00:00", "type": "freebsd", "title": "django -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-04T00:00:00", "id": "DC880D6C-195D-11E7-8C63-0800277DCC69", "href": "https://vuxml.freebsd.org/freebsd/dc880d6c-195d-11e7-8c63-0800277dcc69.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "mageia": [{"lastseen": "2022-04-18T11:19:34", "description": "It was discovered that Django incorrectly handled numeric redirect URLs. A remote attacker could possibly use this issue to perform XSS attacks, and to use a Django server as an open redirect. (CVE-2017-7233) Phithon Gong discovered that Django incorrectly handled certain URLs when the jango.views.static.serve() view is being used. A remote attacker could possibly use a Django server as an open redirect. (CVE-2017-7234) \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2017-04-14T19:40:32", "type": "mageia", "title": "Updated python-django packages fix security vulnerability\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7233", "CVE-2017-7234"], "modified": "2017-04-14T19:40:32", "id": "MGASA-2017-0106", "href": "https://advisories.mageia.org/MGASA-2017-0106.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}]}