Debian dsa-6136 : python-django-doc - security update

critical Nessus Plugin ID 299143

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6136 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-6136-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff February 15, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : python-django CVE ID : CVE-2023-41164 CVE-2023-43665 CVE-2024-24680 CVE-2024-27351 CVE-2024-39329 CVE-2024-39330 CVE-2024-39614 CVE-2024-41989 CVE-2024-41991 CVE-2024-42005 CVE-2024-45231 CVE-2024-53907 CVE-2024-56374 CVE-2025-13372 CVE-2025-26699 CVE-2025-32873 CVE-2025-48432 CVE-2025-57833 CVE-2025-59681 CVE-2025-59682 CVE-2025-64459 CVE-2025-64460

Multiple security issues were found in Django, a Python web development framework, which could result in denial of service, information disclosure, directory traversal or SQL injection.

For the oldstable distribution (bookworm), these problems have been fixed in version 3:3.2.25-0+deb12u1. python-django-storages also needed to be updated to ensure ongoing compatibility (1.13.2-1+deb12u1).

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the python-django-doc packages.

See Also

http://www.nessus.org/u?22eb32f6

https://packages.debian.org/source/bookworm/python-django

https://security-tracker.debian.org/tracker/CVE-2023-41164

https://security-tracker.debian.org/tracker/CVE-2024-53907

https://security-tracker.debian.org/tracker/CVE-2024-56374

https://security-tracker.debian.org/tracker/CVE-2025-26699

https://security-tracker.debian.org/tracker/CVE-2023-43665

https://security-tracker.debian.org/tracker/CVE-2024-24680

https://security-tracker.debian.org/tracker/CVE-2024-27351

https://security-tracker.debian.org/tracker/CVE-2025-32873

https://security-tracker.debian.org/tracker/CVE-2025-48432

https://security-tracker.debian.org/tracker/CVE-2024-45231

https://security-tracker.debian.org/tracker/CVE-2024-39329

https://security-tracker.debian.org/tracker/CVE-2024-39614

https://security-tracker.debian.org/tracker/CVE-2024-41991

https://security-tracker.debian.org/tracker/CVE-2024-39330

https://security-tracker.debian.org/tracker/CVE-2024-41989

https://security-tracker.debian.org/tracker/CVE-2024-42005

https://security-tracker.debian.org/tracker/CVE-2025-57833

https://security-tracker.debian.org/tracker/CVE-2025-59681

https://security-tracker.debian.org/tracker/CVE-2025-59682

https://security-tracker.debian.org/tracker/CVE-2025-64459

https://security-tracker.debian.org/tracker/CVE-2025-13372

https://security-tracker.debian.org/tracker/CVE-2025-64460

Plugin Details

Severity: Critical

ID: 299143

File Name: debian_DSA-6136.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/15/2026

Updated: 2/15/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-59681

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: Critical

Base Score: 9.3

Threat Score: 8.8

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-42005

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:python-django-doc, p-cpe:/a:debian:debian_linux:python3-django, cpe:/o:debian:debian_linux:12.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/15/2026

Vulnerability Publication Date: 9/4/2023

Reference Information

CVE: CVE-2023-41164, CVE-2023-43665, CVE-2024-24680, CVE-2024-27351, CVE-2024-39329, CVE-2024-39330, CVE-2024-39614, CVE-2024-41989, CVE-2024-41991, CVE-2024-42005, CVE-2024-45231, CVE-2024-53907, CVE-2024-56374, CVE-2025-13372, CVE-2025-26699, CVE-2025-32873, CVE-2025-48432, CVE-2025-57833, CVE-2025-59681, CVE-2025-59682, CVE-2025-64459, CVE-2025-64460