openSUSE Security Update : python-Django (openSUSE-2015-677)

high Nessus Plugin ID 86594

Synopsis

The remote openSUSE host is missing a security update.

Description

python-django was updated to fix two security issues.

These security issues were fixed :

- CVE-2015-5144: Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 used an incorrect regular expression, which allowed remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator (bsc#937523).

- CVE-2015-5143: The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allowed remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys (bsc#937522).

Solution

Update the affected python-Django package.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=937522

https://bugzilla.opensuse.org/show_bug.cgi?id=937523

Plugin Details

Severity: High

ID: 86594

File Name: openSUSE-2015-677.nasl

Version: 2.3

Type: local

Agent: unix

Published: 10/26/2015

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:python-django, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 10/15/2015

Reference Information

CVE: CVE-2015-5143, CVE-2015-5144