Ubuntu 9.10 / 10.04 LTS / 10.10 : python-django vulnerabilities (USN-1066-1)

Ubuntu Security Notice (C) 2011-2013 Canonical, Inc. / NASL script (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

It was discovered that Django did not properly validate HTTP requests
that contain an X-Requested-With header. An attacker could exploit
this vulnerability to perform cross-site request forgery (CSRF)
attacks. (CVE-2011-0696)

It was discovered that Django did not properly sanitize its input when
performing file uploads, resulting in cross-site scripting (XSS)
vulnerabilities. With cross-site scripting vulnerabilities, if a user
were tricked into viewing server output during a crafted server
request, a remote attacker could exploit this to modify the contents,
or steal confidential data, within the same domain. (CVE-2011-0697).

Solution :

Update the affected python-django and / or python-django-doc packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 52022 ()

Bugtraq ID: 46296

CVE ID: CVE-2011-0696
CVE-2011-0697