Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.841353
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-1757-1)
Summary:The remote host is missing an update for the 'python-django' package(s) announced via the USN-1757-1 advisory.
Description:Summary:
The remote host is missing an update for the 'python-django' package(s) announced via the USN-1757-1 advisory.

Vulnerability Insight:
James Kettle discovered that Django did not properly filter the Host HTTP
header when processing certain requests. An attacker could exploit this to
generate and display arbitrary URLs to users. Although this issue had been
previously addressed in USN-1632-1, this update adds additional hardening
measures to host header validation. This update also adds a new
ALLOWED_HOSTS setting that can be set to a list of acceptable values for
headers. (CVE-2012-4520)

Orange Tsai discovered that Django incorrectly performed permission checks
when displaying the history view in the admin interface. An administrator
could use this flaw to view the history of any object, regardless of
intended permissions. (CVE-2013-0305)

It was discovered that Django incorrectly handled a large number of forms
when generating formsets. An attacker could use this flaw to cause Django
to consume memory, resulting in a denial of service. (CVE-2013-0306)

It was discovered that Django incorrectly deserialized XML. An attacker
could use this flaw to perform entity-expansion and external-entity/DTD
attacks. This updated modified Django behaviour to no longer allow DTDs,
perform entity expansion, or fetch external entities/DTDs. (CVE-2013-1664,
CVE-2013-1665)

Affected Software/OS:
'python-django' package(s) on Ubuntu 10.04, Ubuntu 11.10, Ubuntu 12.04, Ubuntu 12.10.

Solution:
Please install the updated package(s).

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-4520
Debian Security Information: DSA-2634 (Google Search)
http://www.debian.org/security/2013/dsa-2634
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
https://bugzilla.redhat.com/show_bug.cgi?id=865164
http://www.openwall.com/lists/oss-security/2012/10/30/4
http://www.osvdb.org/86493
http://securitytracker.com/id?1027708
http://secunia.com/advisories/51033
http://secunia.com/advisories/51314
http://ubuntu.com/usn/usn-1632-1
http://ubuntu.com/usn/usn-1757-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-0305
DSA-2634
RHSA-2013:0670
http://rhn.redhat.com/errata/RHSA-2013-0670.html
USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
Common Vulnerability Exposure (CVE) ID: CVE-2013-0306
Common Vulnerability Exposure (CVE) ID: CVE-2013-1664
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://www.openwall.com/lists/oss-security/2013/02/19/4
http://www.openwall.com/lists/oss-security/2013/02/19/2
RedHat Security Advisories: RHSA-2013:0657
http://rhn.redhat.com/errata/RHSA-2013-0657.html
RedHat Security Advisories: RHSA-2013:0658
http://rhn.redhat.com/errata/RHSA-2013-0658.html
RedHat Security Advisories: RHSA-2013:0670
Common Vulnerability Exposure (CVE) ID: CVE-2013-1665
CopyrightCopyright (C) 2013 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.