FreeBSD : Django -- password hash disclosure (004d8c23-c710-11e8-98c7-000c29434208)

medium Nessus Plugin ID 117910

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Django release notes :

CVE-2018-16984: Password hash disclosure to 'view only' admin users

If an admin user has the change permission to the user model, only part of the password hash is displayed in the change form. Admin users with the view (but not change) permission to the user model were displayed the entire hash. While it's typically infeasible to reverse a strong password hash, if your site uses weaker password hashing algorithms such as MD5 or SHA1, it could be a problem.

Solution

Update the affected packages.

See Also

https://docs.djangoproject.com/en/2.1/releases/2.1.2/

http://www.nessus.org/u?fa9bb16b

Plugin Details

Severity: Medium

ID: 117910

File Name: freebsd_pkg_004d8c23c71011e898c7000c29434208.nasl

Version: 1.4

Type: local

Published: 10/4/2018

Updated: 2/17/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2018-16984

CVSS v3

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:py34-django21, p-cpe:/a:freebsd:freebsd:py35-django21, p-cpe:/a:freebsd:freebsd:py36-django21, p-cpe:/a:freebsd:freebsd:py37-django21, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 10/3/2018

Vulnerability Publication Date: 10/2/2018

Reference Information

CVE: CVE-2018-16984