ASA-202006-8 log generated external raw

[ASA-202006-8] python-django: multiple issues
Arch Linux Security Advisory ASA-202006-8 ========================================= Severity: Medium Date : 2020-06-06 CVE-ID : CVE-2020-13254 CVE-2020-13596 Package : python-django Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-1176 Summary ======= The package python-django before version 3.0.7-1 is vulnerable to multiple issues including cross-site scripting and information disclosure. Resolution ========== Upgrade to 3.0.7-1. # pacman -Syu "python-django>=3.0.7-1" The problems have been fixed upstream in version 3.0.7. Workaround ========== None. Description =========== - CVE-2020-13254 (information disclosure) An information disclosure issue has been found in Django before 3.0.7, via malformed memcached keys. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. In order to avoid this vulnerability, key validation is added to the memcached cache backends. - CVE-2020-13596 (cross-site scripting) A possible XSS has been found in Django before 3.0.7, via admin ForeignKeyRawIdWidget. Query parameters for the admin ForeignKeyRawIdWidget were not properly URL encoded, posing an XSS attack vector. Impact ====== A remote attacker can leak data through malformed cache keys. An authenticated user could execute javascript through an admin widget. References ========== https://www.djangoproject.com/weblog/2020/jun/03/security-releases/ https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693 https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38 https://security.archlinux.org/CVE-2020-13254 https://security.archlinux.org/CVE-2020-13596