The openSUSE 15 host is vulnerable to denial-of-service attack via python-Django package (CVE-2023-24580
Reporter | Title | Published | Views | Family All 67 |
---|---|---|---|---|
Prion | Design/Logic Flaw | 15 Feb 202301:15 | – | prion |
OSV | CVE-2023-24580 | 15 Feb 202301:15 | – | osv |
OSV | python-django - security update | 20 Feb 202300:00 | – | osv |
OSV | Resource exhaustion in Django | 15 Feb 202303:30 | – | osv |
OSV | python310-Django-4.1.7-1.1 on GA media | 15 Jun 202400:00 | – | osv |
OSV | python-django vulnerability | 14 Feb 202313:32 | – | osv |
OSV | PYSEC-2023-13 | 15 Feb 202301:15 | – | osv |
OSV | BIT-django-2023-24580 | 6 Mar 202410:52 | – | osv |
OSV | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 18 Sep 202405:30 | – | osv |
OSV | Red Hat Security Advisory: RHUI 4.4.0 release - Security Fixes, Bug Fixes, and Enhancements Update | 18 Sep 202405:28 | – | osv |
Source | Link |
---|---|
nessus | www.nessus.org/u |
bugzilla | www.bugzilla.suse.com/1208082 |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
suse | www.suse.com/security/cve/CVE-2023-24580 |
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# openSUSE Security Update openSUSE-SU-2023:0075-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(172569);
script_version("1.0");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/03/15");
script_cve_id("CVE-2023-24580");
script_name(english:"openSUSE 15 Security Update : python-Django (openSUSE-SU-2023:0075-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote openSUSE host is missing a security update.");
script_set_attribute(attribute:"description", value:
"The remote openSUSE 15 host has a package installed that is affected by a vulnerability as referenced in the openSUSE-
SU-2023:0075-1 advisory.
- An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10,
and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could
result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-
service attack. (CVE-2023-24580)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208082");
# https://lists.opensuse.org/archives/list/[email protected]/thread/AQ2N7SB2HJKGBLQVFSOCRHCY66P6ACKC/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e11dcfa9");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-24580");
script_set_attribute(attribute:"solution", value:
"Update the affected python3-Django1 package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-24580");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/02/14");
script_set_attribute(attribute:"patch_publication_date", value:"2023/03/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/03/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-Django1");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.4");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/SuSE/release');
if (isnull(os_release) || os_release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, 'openSUSE');
var _os_ver = pregmatch(pattern: "^SUSE([\d.]+)", string:os_release);
if (isnull(_os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');
_os_ver = _os_ver[1];
if (os_release !~ "^(SUSE15\.4)$") audit(AUDIT_OS_RELEASE_NOT, 'openSUSE', '15.4', os_release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE ' + _os_ver, cpu);
var pkgs = [
{'reference':'python3-Django1-1.11.29-bp154.2.3.1', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE}
];
var flag = 0;
foreach package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var _cpu = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (rpm_check(release:_release, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'python3-Django1');
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo