Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 481624 (CVE-2013-4249) - <dev-python/django-1.4.8 : XSS (CVE-2013-4249)
Summary: <dev-python/django-1.4.8 : XSS (CVE-2013-4249)
Status: RESOLVED FIXED
Alias: CVE-2013-4249
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B4 [noglsa]
Keywords:
Depends on: CVE-2013-1443
Blocks:
  Show dependency tree
 
Reported: 2013-08-19 10:46 UTC by Agostino Sarubbo
Modified: 2013-10-28 17:53 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-08-19 10:46:49 UTC
From ${URL} :

Issue: Cross-site scripting (XSS) in admin interface

The Django administrative application, django.contrib.admin, provides functionality for CRUD 
(Creation, Retrieval, Updating and Deleting) operations by trusted users, including facilities for 
both automatic and customized data-manipulation interfaces.

When displaying the value of a URLField -- a model field type for storing URLs -- this interface 
treated the values of such fields as safe, thus failing to properly accommodate the potential for 
dangerous values. A proof-of-concept application has been provided to the Django project, showing 
how this can be exploited to perform XSS in the administrative interface.

In a normal Django deployment, this will only affect the administrative interface, as the incorrect 
handling occurs only in form-widget code in django.contrib.admin. It is, however, possible that 
other applications may be affected, if those applications make use of form widgets provided by the 
admin interface.

To remedy this issue, the widget in question -- django.contrib.admin.widgets.AdminURLFieldWidget -- 
has been corrected to treat its value the same as any other potentially-user-supplied value; in 
other words, it will be treated as unsafe, and subject to Django's (enabled by default) output 
escaping.

Thanks to Łukasz Langa for reporting this issue to us.



@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-10-06 23:25:11 UTC
CVE-2013-4249 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4249):
  Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget
  in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before
  1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML
  via a URLField.