Lucene search

K
gentooGentoo FoundationGLSA-201510-06
HistoryOct 31, 2015 - 12:00 a.m.

Django: Multiple vulnerabilities

2015-10-3100:00:00
Gentoo Foundation
security.gentoo.org
13

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.135 Low

EPSS

Percentile

95.6%

Background

Django is a Python-based web framework.

Description

Multiple vulnerabilities have been found in Django:

  • Session backends create a new record anytime request.session was accessed (CVE-2015-5143)
  • Built-in validators in Django do not properly sanitize input (CVE-2015-5144)
  • URL validation included a regular expression that was extremely slow (CVE-2015-5145)

Impact

A remote attacker may be able cause a Denial of Service condition, inject arbitrary headers, and conduct HTTP response splitting attacks.

Workaround

There is no known workaround at this time.

Resolution

All Django 1.8 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/django-1.8.3"

All Django 1.7 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/django-1.7.9"

All Django 1.4 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/django-1.4.21"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-python/django< 1.8.3UNKNOWN

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.135 Low

EPSS

Percentile

95.6%