Mandriva Linux Security Advisory : python-django (MDVSA-2009:276-1)

medium Nessus Plugin ID 42131

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

Multiple vulnerabilities has been found and corrected in python-django :

The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected static media files, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL (CVE-2009-2659).

Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression (CVE-2009-3695).

The versions of Django shipping with Mandriva Linux have been updated to the latest patched version that include the fix for this issue. In addition, they provide other bug fixes.

Update :

Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers

Solution

Update the affected python-django package.

See Also

http://www.djangoproject.com/weblog/2009/jul/28/security/

http://www.djangoproject.com/weblog/2009/oct/09/security/

Plugin Details

Severity: Medium

ID: 42131

File Name: mandriva_MDVSA-2009-276.nasl

Version: 1.16

Type: local

Published: 10/15/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:python-django, cpe:/o:mandriva:linux:2008.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/8/2009

Reference Information

CVE: CVE-2009-2659, CVE-2009-3695

BID: 35859

CWE: 22

MDVSA: 2009:276-1