[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3835-1 python-django -- python-django

ID: oval:org.secpod.oval:def:602859Date: (C)2017-04-27   (M)2023-12-20
Class: PATCHFamily: unix




Several vulnerabilities were discovered in Django, a high-level Python web development framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-9013 Marti Raudsepp reported that a user with a hardcoded password is created when running tests with an Oracle database. CVE-2016-9014 Aymeric Augustin discovered that Django does not properly validate the Host header against settings.ALLOWED_HOSTS when the debug setting is enabled. A remote attacker can take advantage of this flaw to perform DNS rebinding attacks. CVE-2017-7233 It was discovered that is_safe_url does not properly handle certain numeric URLs as safe. A remote attacker can take advantage of this flaw to perform XSS attacks or to use a Django server as an open redirect. CVE-2017-7234 Phithon from Chaitin Tech discovered an open redirect vulnerability in the django.views.static.serve view. Note that this view is not intended for production use.

Platform:
Debian 8.x
Product:
python-django
Reference:
DSA-3835-1
CVE-2016-9013
CVE-2016-9014
CVE-2017-7233
CVE-2017-7234
CVE    4
CVE-2016-9014
CVE-2016-9013
CVE-2017-7234
CVE-2017-7233
...
CPE    2
cpe:/o:debian:debian_linux:8.x
cpe:/a:djangoproject:python-django

© SecPod Technologies