ASA-202006-8 log generated external raw
[ASA-202006-8] python-django: multiple issues |
---|
Arch Linux Security Advisory ASA-202006-8
=========================================
Severity: Medium
Date : 2020-06-06
CVE-ID : CVE-2020-13254 CVE-2020-13596
Package : python-django
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1176
Summary
=======
The package python-django before version 3.0.7-1 is vulnerable to
multiple issues including cross-site scripting and information
disclosure.
Resolution
==========
Upgrade to 3.0.7-1.
# pacman -Syu "python-django>=3.0.7-1"
The problems have been fixed upstream in version 3.0.7.
Workaround
==========
None.
Description
===========
- CVE-2020-13254 (information disclosure)
An information disclosure issue has been found in Django before 3.0.7,
via malformed memcached keys. In cases where a memcached backend does
not perform key validation, passing malformed cache keys could result
in a key collision, and potential data leakage. In order to avoid this
vulnerability, key validation is added to the memcached cache backends.
- CVE-2020-13596 (cross-site scripting)
A possible XSS has been found in Django before 3.0.7, via admin
ForeignKeyRawIdWidget. Query parameters for the admin
ForeignKeyRawIdWidget were not properly URL encoded, posing an XSS
attack vector.
Impact
======
A remote attacker can leak data through malformed cache keys. An
authenticated user could execute javascript through an admin widget.
References
==========
https://www.djangoproject.com/weblog/2020/jun/03/security-releases/
https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693
https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
https://security.archlinux.org/CVE-2020-13254
https://security.archlinux.org/CVE-2020-13596
|