Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
USN-2469-1 fixed vulnerabilities in Django. The security fix for
CVE-2015-0221 introduced a regression on Ubuntu 10.04 LTS and Ubuntu
12.04 LTS when serving static content through GZipMiddleware. This
update fixes the problem.
We apologize for the inconvenience.
Jedediah Smith discovered that Django incorrectly handled underscores
in WSGI headers. A remote attacker could possibly use this issue to
spoof headers in certain environments. (CVE-2015-0219)
Mikko Ohtamaa discovered that Django incorrectly handled
user-supplied redirect URLs. A remote attacker could
possibly use this issue to perform a cross-site scripting
Alex Gaynor discovered that Django incorrectly handled
reading files in django.views.static.serve(). A remote
attacker could possibly use this issue to cause Django to
consume resources, resulting in a denial of service.
Keryn Knight discovered that Django incorrectly handled
forms with ModelMultipleChoiceField. A remote attacker could
possibly use this issue to cause a large number of SQL
queries, resulting in a database denial of service. This
issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected python-django package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.7
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 81177 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now