Mandriva Linux Security Advisory : python-django (MDVSA-2009:276-1)

Medium Nessus Plugin ID 42131


The remote Mandriva Linux host is missing a security update.


Multiple vulnerabilities has been found and corrected in python-django :

The Admin media handler in core/servers/ in Django 1.0 and 0.96 does not properly map URL requests to expected static media files, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL (CVE-2009-2659).

Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression (CVE-2009-3695).

The versions of Django shipping with Mandriva Linux have been updated to the latest patched version that include the fix for this issue. In addition, they provide other bug fixes.

Update :

Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers


Update the affected python-django package.

See Also

Plugin Details

Severity: Medium

ID: 42131

File Name: mandriva_MDVSA-2009-276.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2009/10/15

Modified: 2015/03/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:python-django, cpe:/o:mandriva:linux:2008.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/12/08

Reference Information

CVE: CVE-2009-2659, CVE-2009-3695

BID: 35859

MDVSA: 2009:276-1

CWE: 22