Lucene search

K
mageiaGentoo FoundationMGASA-2013-0284
HistorySep 19, 2013 - 1:45 p.m.

Updated python-django package fixes multiple vulnerabilities

2013-09-1913:45:04
Gentoo Foundation
advisories.mageia.org
16

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.013 Low

EPSS

Percentile

85.7%

Updated python-django package fixes security vulnerabilities: Rainer Koirikivi discovered a directory traversal vulnerability with โ€˜ssiโ€™ template tags in python-django, a high-level Python web development framework. It was shown that the handling of the โ€˜ALLOWED_INCLUDE_ROOTSโ€™ setting, used to represent allowed prefixes for the {% ssi %} template tag, is vulnerable to a directory traversal attack, by specifying a file path which begins as the absolute path of a directory in โ€˜ALLOWED_INCLUDE_ROOTSโ€™, and then uses relative paths to break free. To exploit this vulnerability an attacker must be in a position to alter templates on the site, or the site to be attacked must have one or more templates making use of the โ€˜ssiโ€™ tag, and must allow some form of unsanitized user input to be used as an argument to the โ€˜ssiโ€™ tag (CVE-2013-4315). Django before 1.4.8 allows for denial-of-service attacks through repeated submission of large passwords, tying up server resources in the expensive computation of the corresponding hashes (CVE-2013-1443).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchpython-django<ย 1.4.8-1python-django-1.4.8-1.mga3

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.013 Low

EPSS

Percentile

85.7%