5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.3 Medium
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
79.1%
Debian Security Advisory DSA-4264-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
August 05, 2018 https://www.debian.org/security/faq
Package : python-django
CVE ID : CVE-2018-14574
Andreas Hug discovered an open redirect in Django, a Python web
development framework, which is exploitable if
django.middleware.common.CommonMiddleware is used and the APPEND_SLASH
setting is enabled.
For the stable distribution (stretch), this problem has been fixed in
version 1:1.10.7-2+deb9u2.
We recommend that you upgrade your python-django packages.
For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | python3-django | < 1:1.10.7-2+deb9u2 | python3-django_1:1.10.7-2+deb9u2_all.deb |
Debian | 9 | all | python-django-doc | < 1:1.10.7-2+deb9u2 | python-django-doc_1:1.10.7-2+deb9u2_all.deb |
Debian | 9 | all | python-django-common | < 1:1.10.7-2+deb9u2 | python-django-common_1:1.10.7-2+deb9u2_all.deb |
Debian | 9 | all | python-django | < 1:1.10.7-2+deb9u2 | python-django_1:1.10.7-2+deb9u2_all.deb |
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.3 Medium
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
79.1%