|
|
Subscribe / Log in / New account

Arch Linux alert ASA-201901-7 (python2-django)

From:  Jelle van der Waa <jelle@archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-201901-7] python2-django: content spoofing
Date:  Sun, 13 Jan 2019 21:48:28 +0100
Message-ID:  <20190113204828.bylvuig6imhk5aoz@mail.archlinux.org>

Arch Linux Security Advisory ASA-201901-7 ========================================= Severity: Medium Date : 2019-01-11 CVE-ID : CVE-2019-3498 Package : python2-django Type : content spoofing Remote : Yes Link : https://security.archlinux.org/AVG-838 Summary ======= The package python2-django before version 1.11.18-1 is vulnerable to content spoofing. Resolution ========== Upgrade to 1.11.18-1. # pacman -Syu "python2-django>=1.11.18-1" The problem has been fixed upstream in version 1.11.18. Workaround ========== None. Description =========== A content spoofing issue has been found in django before 2.1.5 and 1.11.18, where an attacker could craft a malicious URL that could make spoofed content appear on the default page generated by the django.views.defaults.page_not_found() view. Impact ====== A remote attacker can spoof content on the not found page with a maliciously crafted URL. References ========== https://www.djangoproject.com/weblog/2019/jan/04/security... https://github.com/django/django/commit/64d2396e83aedba3f... https://github.com/django/django/commit/1cd00fcf52d089ef0... https://security.archlinux.org/CVE-2019-3498


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds