FreeBSD : django -- multiple vulnerabilities (21c59f5e-7cc5-11e2-9c11-080027a5ec9a)

medium Nessus Plugin ID 64873
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Django Project reports :

These security releases fix four issues: one potential phishing vector, one denial-of-service vector, an information leakage issue, and a range of XML vulnerabilities.

- Host header poisoning

an attacker could cause Django to generate and display URLs that link to arbitrary domains. This could be used as part of a phishing attack.
These releases fix this problem by introducing a new setting, ALLOWED_HOSTS, which specifies a whitelist of domains your site is known to respond to.

Important: by default Django 1.3.6 and 1.4.4 set ALLOWED_HOSTS to allow all hosts. This means that to actually fix the security vulnerability you should define this setting yourself immediately after upgrading.

- Formset denial-of-service

an attacker can abuse Django's tracking of the number of forms in a formset to cause a denial-of-service attack. This has been fixed by adding a default maximum number of forms of 1,000. You can still manually specify a bigger max_num, if you wish, but 1,000 should be enough for anyone.

- XML attacks

Django's serialization framework was vulnerable to attacks via XML entity expansion and external references; this is now fixed. However, if you're parsing arbitrary XML in other parts of your application, we recommend you look into the defusedxml Python packages which remedy this anywhere you parse XML, not just via Django's serialization framework.

- Data leakage via admin history log

Django's admin interface could expose supposedly-hidden information via its history log. This has been fixed.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?325e72d2

Plugin Details

Severity: Medium

ID: 64873

File Name: freebsd_pkg_21c59f5e7cc511e29c11080027a5ec9a.nasl

Version: 1.8

Type: local

Published: 2/25/2013

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:py26-django, p-cpe:/a:freebsd:freebsd:py27-django, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 2/24/2013

Vulnerability Publication Date: 2/21/2013

Reference Information

CVE: CVE-2013-0305, CVE-2013-0306, CVE-2013-1664, CVE-2013-1665

BID: 58022, 58061