Summary
Several vulnerabilities were
discovered in Django, a high-level Python web development framework. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2015-0219
Jedediah Smith reported that the WSGI environ in Django does not distinguish between headers containing dashes and headers containing underscores. A remote attacker could use this flaw to spoof WSGI headers.
CVE-2015-0220
Mikko Ohtamaa discovered that the django.util.http.is_safe_url() function in Django does not properly handle leading whitespaces in user-supplied redirect URLs. A remote attacker could potentially use this flaw to perform a cross-site scripting attack.
CVE-2015-0221
Alex Gaynor reported a flaw in the way Django handles reading files in the django.views.static.serve() view. A remote attacker could possibly use this flaw to mount a denial of service via resource consumption.
Solution
For the stable distribution (wheezy),
these problems have been fixed in version 1.4.5-1+deb7u9.
For the upcoming stable distribution (jessie), these problems have been fixed in version 1.7.1-1.1.
For the unstable distribution (sid), these problems have been fixed in version 1.7.1-1.1.
We recommend that you upgrade your python-django packages.
Insight
Django is a high-level web application
framework that loosely follows the model-view-controller design pattern.
Affected
python-django on Debian Linux
Detection
This check tests the installed software
version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2015-0219, CVE-2015-0220, CVE-2015-0221 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities