GLSA-201510-06 : Django: Multiple vulnerabilities

high Nessus Plugin ID 86691

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-201510-06 (Django: Multiple vulnerabilities)

Multiple vulnerabilities have been found in Django:
Session backends create a new record anytime request.session was accessed (CVE-2015-5143) Built-in validators in Django do not properly sanitize input (CVE-2015-5144) URL validation included a regular expression that was extremely slow (CVE-2015-5145) Impact :

A remote attacker may be able cause a Denial of Service condition, inject arbitrary headers, and conduct HTTP response splitting attacks.
Workaround :

There is no known workaround at this time.

Solution

All Django 1.8 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-python/django-1.8.3' All Django 1.7 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-python/django-1.7.9' All Django 1.4 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-python/django-1.4.21'

See Also

https://security.gentoo.org/glsa/201510-06

Plugin Details

Severity: High

ID: 86691

File Name: gentoo_GLSA-201510-06.nasl

Version: 2.2

Type: local

Published: 11/2/2015

Updated: 1/11/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:django, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 10/31/2015

Reference Information

CVE: CVE-2015-5143, CVE-2015-5144, CVE-2015-5145

GLSA: 201510-06