ALT-BU-2017-3189-1
Branch p8 update bulletin.
Package python-module-django updated to version 1.8.18-alt0.M80P.1 for branch p8 in task 184483.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-2512
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
- RHSA-2016:0502
- RHSA-2016:0502
- RHSA-2016:0504
- RHSA-2016:0504
- RHSA-2016:0505
- RHSA-2016:0505
- RHSA-2016:0506
- RHSA-2016:0506
- DSA-3544
- DSA-3544
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 83879
- 83879
- 1035152
- 1035152
- USN-2915-1
- USN-2915-1
- USN-2915-2
- USN-2915-2
- USN-2915-3
- USN-2915-3
- https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
- https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
Modified: 2024-11-21
CVE-2016-2513
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
- RHSA-2016:0502
- RHSA-2016:0502
- RHSA-2016:0504
- RHSA-2016:0504
- RHSA-2016:0505
- RHSA-2016:0505
- RHSA-2016:0506
- RHSA-2016:0506
- DSA-3544
- DSA-3544
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 83878
- 83878
- 1035152
- 1035152
- USN-2915-1
- USN-2915-1
- USN-2915-2
- USN-2915-2
- USN-2915-3
- USN-2915-3
- https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab
- https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
Modified: 2024-11-21
CVE-2016-6186
Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
- http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html
- http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html
- RHSA-2016:1594
- RHSA-2016:1594
- RHSA-2016:1595
- RHSA-2016:1595
- RHSA-2016:1596
- RHSA-2016:1596
- 20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)
- 20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)
- DSA-3622
- DSA-3622
- 20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)
- 20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)
- 92058
- 92058
- 1036338
- 1036338
- USN-3039-1
- USN-3039-1
- http://www.vulnerability-lab.com/get_content.php?id=1869
- http://www.vulnerability-lab.com/get_content.php?id=1869
- https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158
- https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158
- https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d
- https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d
- FEDORA-2016-b7e31a0b9a
- FEDORA-2016-b7e31a0b9a
- FEDORA-2016-97ca9d52a4
- FEDORA-2016-97ca9d52a4
- https://www.djangoproject.com/weblog/2016/jul/18/security-releases/
- https://www.djangoproject.com/weblog/2016/jul/18/security-releases/
- 40129
- 40129
Modified: 2024-11-21
CVE-2016-7401
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
- RHSA-2016:2038
- RHSA-2016:2038
- RHSA-2016:2039
- RHSA-2016:2039
- RHSA-2016:2040
- RHSA-2016:2040
- RHSA-2016:2041
- RHSA-2016:2041
- RHSA-2016:2042
- RHSA-2016:2042
- RHSA-2016:2043
- RHSA-2016:2043
- DSA-3678
- DSA-3678
- 93182
- 93182
- 1036899
- 1036899
- USN-3089-1
- USN-3089-1
- https://www.djangoproject.com/weblog/2016/sep/26/security-releases/
- https://www.djangoproject.com/weblog/2016/sep/26/security-releases/
Modified: 2024-11-21
CVE-2016-9013
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
Modified: 2024-11-21
CVE-2016-9014
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
Modified: 2024-11-21
CVE-2017-7233
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
- DSA-3835
- DSA-3835
- 97406
- 97406
- 1038177
- 1038177
- RHSA-2017:1445
- RHSA-2017:1445
- RHSA-2017:1451
- RHSA-2017:1451
- RHSA-2017:1462
- RHSA-2017:1462
- RHSA-2017:1470
- RHSA-2017:1470
- RHSA-2017:1596
- RHSA-2017:1596
- RHSA-2017:3093
- RHSA-2017:3093
- RHSA-2018:2927
- RHSA-2018:2927
- https://www.djangoproject.com/weblog/2017/apr/04/security-releases/
- https://www.djangoproject.com/weblog/2017/apr/04/security-releases/
Modified: 2024-11-21
CVE-2017-7234
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.