Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : python-django vulnerabilities (USN-1297-1)

Ubuntu Security Notice (C) 2011-2013 Canonical, Inc. / NASL script (C) 2011-2013 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Pall McMillan discovered that Django used the root namespace when
storing cached session data. A remote attacker could exploit this to
modify sessions. (CVE-2011-4136)

Paul McMillan discovered that Django would not timeout on arbitrary
URLs when the application used URLFields. This could be exploited by a
remote attacker to cause a denial of service via resource exhaustion.

Paul McMillan discovered that while Django would check the validity of
a URL via a HEAD request, it would instead use a GET request for the
target of a redirect. This could potentially be used to trigger
arbitrary GET requests via a crafted Location header. (CVE-2011-4138)

It was discovered that Django would sometimes use a request's HTTP
Host header to construct a full URL. A remote attacker could exploit
this to conduct host header cache poisoning attacks via a crafted
request. (CVE-2011-4139).

Solution :

Update the affected python-django package.

Risk factor :

Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.8
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 57061 ()

Bugtraq ID: 49573

CVE ID: CVE-2011-4136