FreeBSD : django -- XSS vulnerability (f49ba347-2190-11dd-907c-001c2514716c)

Medium Nessus Plugin ID 32350


The remote FreeBSD host is missing one or more security-related updates.


Django project reports :

The Django administration application will, when accessed by a user who is not sufficiently authenticated, display a login form and ask the user to provide the necessary credentials before displaying the requested page. This form will be submitted to the URL the user attempted to access, by supplying the current request path as the value of the form's 'action' attribute.

The value of the request path was not being escaped, creating an opportunity for a cross-site scripting (XSS) attack by leading a user to a URL which contained URL-encoded HTML and/or JavaScript in the request path.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 32350

File Name: freebsd_pkg_f49ba347219011dd907c001c2514716c.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2008/05/16

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:py23-django, p-cpe:/a:freebsd:freebsd:py23-django-devel, p-cpe:/a:freebsd:freebsd:py24-django, p-cpe:/a:freebsd:freebsd:py24-django-devel, p-cpe:/a:freebsd:freebsd:py25-django, p-cpe:/a:freebsd:freebsd:py25-django-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2008/05/14

Vulnerability Publication Date: 2008/05/10

Reference Information

CVE: CVE-2008-2302

CWE: 79