Lucene search

K
redhatRedHatRHSA-2013:1521
HistoryNov 14, 2013 - 12:00 a.m.

(RHSA-2013:1521) Moderate: python-django security update

2013-11-1400:00:00
access.redhat.com
26

EPSS

0.008

Percentile

81.2%

Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as much
as possible and adhering to the DRY (Donโ€™t Repeat Yourself) principle.

It was discovered that the django.utils.http.is_safe_url() function
considered any URL that used a scheme other than HTTP or HTTPS (for
example, โ€œjavascript:โ€) as safe. An attacker could potentially use this
flaw to perform cross-site scripting (XSS) attacks. (CVE-2013-6044)

A directory traversal flaw was found in Djangoโ€™s โ€œssiโ€ template tag, which
takes a file path as input and outputs that fileโ€™s contents. An attacker
able to alter templates that made use of the โ€œssiโ€ tag on a site could use
this flaw to access any local files accessible to Django. (CVE-2013-4315)

Red Hat would like to thank James Bennett of Django for reporting
CVE-2013-4315.

All python-django users are advised to upgrade to these updated packages,
which contain a backported patch to correct these issues.