Mandriva Linux Security Advisory : python-django (MDVSA-2011:031)

High Nessus Plugin ID 52036


The remote Mandriva Linux host is missing a security update.


Multiple vulnerabilities has been found and corrected in python-django :

Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a combination of browser plugins and redirects, a related issue to CVE-2011-0447 (CVE-2011-0696).

Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload (CVE-2011-0697).

Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays (CVE-2011-0698).

The updated packages have been upgraded to the 1.1.4 version which is not vulnerable to these issues.


Update the affected python-django package.

Plugin Details

Severity: High

ID: 52036

File Name: mandriva_MDVSA-2011-031.nasl

Version: $Revision: 1.9 $

Type: local

Published: 2011/02/20

Modified: 2016/05/17

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:python-django, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/02/18

Reference Information

CVE: CVE-2011-0696, CVE-2011-0697, CVE-2011-0698

BID: 46296

MDVSA: 2011:031