SB2013091607 - Multiple vulnerabilities in Django
Published: September 16, 2013 Updated: February 2, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2013-6044)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.
2) Cross-site scripting (CVE-ID: CVE-2013-4249)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Path traversal (CVE-ID: CVE-2013-4315)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a . (dot dot) in a ssi template tag.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2013-1521.html
- http://seclists.org/oss-sec/2013/q3/369
- http://seclists.org/oss-sec/2013/q3/411
- http://secunia.com/advisories/54476
- http://www.debian.org/security/2013/dsa-2740
- http://www.securityfocus.com/bid/61777
- http://www.securitytracker.com/id/1028915
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86437
- https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f
- https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762
- https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a
- https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86438
- https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78
- https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560
- http://secunia.com/advisories/54772
- http://secunia.com/advisories/54828
- http://www.debian.org/security/2013/dsa-2755
- https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/