Arch Linux alert ASA-201901-7 (python2-django)
From: | Jelle van der Waa <jelle@archlinux.org> | |
To: | arch-security@archlinux.org | |
Subject: | [ASA-201901-7] python2-django: content spoofing | |
Date: | Sun, 13 Jan 2019 21:48:28 +0100 | |
Message-ID: | <20190113204828.bylvuig6imhk5aoz@mail.archlinux.org> |
Arch Linux Security Advisory ASA-201901-7 ========================================= Severity: Medium Date : 2019-01-11 CVE-ID : CVE-2019-3498 Package : python2-django Type : content spoofing Remote : Yes Link : https://security.archlinux.org/AVG-838 Summary ======= The package python2-django before version 1.11.18-1 is vulnerable to content spoofing. Resolution ========== Upgrade to 1.11.18-1. # pacman -Syu "python2-django>=1.11.18-1" The problem has been fixed upstream in version 1.11.18. Workaround ========== None. Description =========== A content spoofing issue has been found in django before 2.1.5 and 1.11.18, where an attacker could craft a malicious URL that could make spoofed content appear on the default page generated by the django.views.defaults.page_not_found() view. Impact ====== A remote attacker can spoof content on the not found page with a maliciously crafted URL. References ========== https://www.djangoproject.com/weblog/2019/jan/04/security... https://github.com/django/django/commit/64d2396e83aedba3f... https://github.com/django/django/commit/1cd00fcf52d089ef0... https://security.archlinux.org/CVE-2019-3498