FreeBSD : Django -- information leakage (d696473f-9f32-42c5-a106-bf4536fb1f74)

high Nessus Plugin ID 106599

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Django release notes :

CVE-2018-6188: Information leakage in AuthenticationForm

A regression in Django 1.11.8 made AuthenticationForm run its confirm_login_allowed() method even if an incorrect password is entered. This can leak information about a user, depending on what messages confirm_login_allowed() raises. If confirm_login_allowed() isn't overridden, an attacker enter an arbitrary username and see if that user has been set to is_active=False. If confirm_login_allowed() is overridden, more sensitive details could be leaked.

This issue is fixed with the caveat that AuthenticationForm can no longer raise the 'This account is inactive.' error if the authentication backend rejects inactive users (the default authentication backend, ModelBackend, has done that since Django 1.10). This issue will be revisited for Django 2.1 as a fix to address the caveat will likely be too invasive for inclusion in older versions.

Solution

Update the affected packages.

See Also

https://docs.djangoproject.com/en/1.11/releases/1.11.10/

https://docs.djangoproject.com/en/2.0/releases/2.0.2/

http://www.nessus.org/u?80ba9760

Plugin Details

Severity: High

ID: 106599

File Name: freebsd_pkg_d696473f9f3242c5a106bf4536fb1f74.nasl

Version: 3.4

Type: local

Published: 2/5/2018

Updated: 11/10/2018

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py27-django111:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py35-django111:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py36-django111:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py35-django20:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py36-django20:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py34-django111:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py27-django20:*:*:*:*:*:*:*, p-cpe:2.3:a:freebsd:freebsd:py34-django20:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/2/2018

Vulnerability Publication Date: 2/1/2018

Reference Information

CVE: CVE-2018-6188