Mandriva Linux Security Advisory : python-django (MDVSA-2008:185)

medium Nessus Plugin ID 37030

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

A cross-site request forgery vulnerability was discovered in Django that, if exploited, could be used to perform unrequested deletion or modification of data. Updated versions of Django will now discard posts from users whose sessions have expired, so data will need to be re-entered in these cases (CVE-2008-3909).

The versions of Django shipping with Mandriva Linux have been updated to the latest patched versions that include the fix for this issue. In addition, they provide other bug fixes.

Solution

Update the affected python-django package.

See Also

http://www.djangoproject.com/weblog/2008/sep/02/security/

Plugin Details

Severity: Medium

ID: 37030

File Name: mandriva_MDVSA-2008-185.nasl

Version: 1.13

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:python-django, cpe:/o:mandriva:linux:2007.1, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2008.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 9/3/2008

Reference Information

CVE: CVE-2008-3909

CWE: 352

MDVSA: 2008:185