Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 372987

Summary: dev-python/django: multiple vulnerabilities (CVE-2010-{4534,4535},CVE-2011-{0696,0697})
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: normal CC: python
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard:
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2011-06-25 13:04:12 UTC
CVE-2011-0697 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0697):
  Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and
  1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web
  script or HTML via a filename associated with a file upload.

CVE-2011-0696 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0696):
  Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate
  HTTP requests that contain an X-Requested-With header, which makes it easier
  for remote attackers to conduct cross-site request forgery (CSRF) attacks
  via forged AJAX requests that leverage a "combination of browser plugins and
  redirects," a related issue to CVE-2011-0447.

CVE-2010-4535 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4535):
  The password reset functionality in django.contrib.auth in Django before
  1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the
  length of a string representing a base36 timestamp, which allows remote
  attackers to cause a denial of service (resource consumption) via a URL that
  specifies a large base36 integer.

CVE-2010-4534 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4534):
  The administrative interface in django.contrib.admin in Django before 1.1.3,
  1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict
  use of the query string to perform certain object filtering, which allows
  remote authenticated users to obtain sensitive information via a series of
  requests containing regular expressions, as demonstrated by a
  created_by__password__regex parameter.
Comment 1 Arfrever Frehtes Taifersar Arahesis (RETIRED) gentoo-dev 2011-06-25 16:17:39 UTC
Duplicate of bugs #349510 and #354183.