openSUSE Security Update : python-Django (openSUSE-2015-281)

Medium Nessus Plugin ID 82515


The remote openSUSE host is missing a security update.


python-django was updated to 1.6.11 to fix security issues and non-security bugs.

THe following vulnerabilities were fixed :

- Made is_safe_url() reject URLs that start with control characters to mitigate possible XSS attack via user-supplied redirect URLs (bnc#923176, CVE-2015-2317)

- Fixed an infinite loop possibility in strip_tags() (bnc#923172, CVE-2015-2316)

- WSGI header spoofing via underscore/dash conflation (bnc#913053, CVE-2015-0219)

- Mitigated possible XSS attack via user-supplied redirect URLs

- Denial-of-service attack against ``django.views.static.serve`` (bnc#913056, CVE-2015-0221)

- Database denial-of-service with ``ModelMultipleChoiceField`` (bnc#913055, CVE-2015-0222)

The update also contains fixes for non-security bugs, functional and stability issues.


Update the affected python-Django package.

See Also

Plugin Details

Severity: Medium

ID: 82515

File Name: openSUSE-2015-281.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2015/04/02

Modified: 2015/04/02

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:python-Django, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2015/03/25

Reference Information

CVE: CVE-2015-0219, CVE-2015-0221, CVE-2015-0222, CVE-2015-2316, CVE-2015-2317