copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.0774 - [Win][UNIX/Linux][Debian] python-django: Multiple vulnerabilities

Date: 20 May 2014
References: ESB-2014.0631  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0774
                       python-django security update
                                20 May 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python-django
Publisher:         Debian
Operating System:  Debian GNU/Linux 6
                   Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote/Unauthenticated      
                   Reduced Security                -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3730 CVE-2014-1418 CVE-2014-0474
                   CVE-2014-0473 CVE-2014-0472 

Reference:         ESB-2014.0631

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2934

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running python-django check for an updated version of the software 
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2934-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
May 19, 2014                           http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : python-django
CVE ID         : CVE-2014-0472 CVE-2014-0473 CVE-2014-0474 CVE-2014-1418 
                 CVE-2014-3730

Several vulnerabilities were discovered in Django, a high-level Python
web development framework. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2014-0472

    Benjamin Bach discovered that Django incorrectly handled dotted
    Python paths when using the reverse() URL resolver function. An
    attacker able to request a specially crafted view from a Django
    application could use this issue to cause Django to import arbitrary
    modules from the Python path, resulting in possible code execution.

CVE-2014-0473

    Paul McMillan discovered that Django incorrectly cached certain
    pages that contained CSRF cookies. A remote attacker could use this
    flaw to acquire the CSRF token of a different user and bypass
    intended CSRF protections in a Django application.

CVE-2014-0474

    Michael Koziarski discovered that certain Django model field classes
    did not properly perform type conversion on their arguments, which
    allows remote attackers to obtain unexpected results.

CVE-2014-1418

    Michael Nelson, Natalia Bidart and James Westby discovered that
    cached data in Django could be served to a different session, or to
    a user with no session at all. An attacker may use this to retrieve
    private data or poison caches.

CVE-2014-3730

    Peter Kuma and Gavin Wahl discovered that Django incorrectly
    validated certain malformed URLs from user input. An attacker may
    use this to cause unexpected redirects.

For the oldstable distribution (squeeze), these problems have been fixed in
version 1.2.3-3+squeeze10.

For the stable distribution (wheezy), these problems have been fixed in
version 1.4.5-1+deb7u7.

For the testing distribution (jessie), these problems have been fixed in
version 1.6.5-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.6.5-1.

We recommend that you upgrade your python-django packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJTemvyAAoJEAVMuPMTQ89EtfQQAJiAPQJLzcGCjp+zvp9JJywJ
+/xkbwJOC5B3BDGZ9DOWRZwLSkVVLYA36bpGz/yFursKsTHqP0MshcBh5kvCC7JA
uFdX7MQCTz2jh9YmEK3Vqf9Y7xihWBsVuBonVy0m+HmBPB/g34GZJ488XBZMK5E3
omvp0PF4q0+u7O8uE+fk2V+zwYy3HiQkz1ZBifT1Fwd5OYoSV6nXRhJdJbrvHxt0
0XTM9v9YjQLW90GOXUh5IZZ1sx+oF0sS3BHXWpPFVt6w8hZJADSBGQTujnq5rk7L
Ph7iRctig3aeb22UToRE/g4OsPtrsSwFIUetg9NVQm41Aov0vlDkR2OUvOAQ8Bax
4vMyH64LU/ti2UjmRmc1MEZsuFkhUcYLUcSupXRYTBbwwHT5Vbbnw+AZR6sJUXPD
+mUUp4y/DsVThJlrK0VyMcrpuUK2nCytU6C8VHLTncHj5GSTcXGKwCEyYxsfZCmt
HdgEV0/GsObuU/qP86mShfKbWeI+RgKpm4bB9/j6yPu5oQkGWPGk5yd+O2QbRMND
QHd4nq1fTZFxYDSI17V8JzAjNbwVsyrigDed571OUBQdTLHarWnh7B9Co0T4oC/b
wxRZriEheqvvBnYOtOxAJcoSUb837ztLSCxX79lGAIz4fCKzEvDv+/HNeqdjqdhR
6SkVES2g4mTwHbtQy8Ep
=7/zi
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=A4fh
-----END PGP SIGNATURE-----