Lucene search

K
freebsdFreeBSDB0E54DC1-45D2-11E5-ADDE-14DAE9D210B8
HistoryAug 18, 2015 - 12:00 a.m.

django -- multiple vulnerabilities

2015-08-1800:00:00
vuxml.freebsd.org
20

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.024 Low

EPSS

Percentile

89.9%

Tim Graham reports:

Denial-of-service possibility in logout() view by filling
session store
Previously, a session could be created when anonymously
accessing the django.contrib.auth.views.logout view
(provided it wasn’t decorated with django.contrib.auth.decorators.login_required
as done in the admin). This could allow an attacker to
easily create many new session records by sending repeated
requests, potentially filling up the session store or
causing other users’ session records to be evicted.
The django.contrib.sessions.middleware.SessionMiddleware
has been modified to no longer create empty session records.
This portion of the fix has been assigned CVE-2015-5963.
Additionally, on the 1.4 and 1.7 series only, the
contrib.sessions.backends.base.SessionBase.flush() and
cache_db.SessionStore.flush() methods have been modified
to avoid creating a new empty session. Maintainers of
third-party session backends should check if the same
vulnerability is present in their backend and correct
it if so.
This portion of the fix has been assigned CVE-2015-5964.
Anyone reporting a similar vulnerability in a third-party
session backend should not use this CVE ID.
Thanks Lin Hua Cheng for reporting the issue.

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.024 Low

EPSS

Percentile

89.9%