MGASA-2014-0196

Source
https://advisories.mageia.org/MGASA-2014-0196.html
Import Source
https://advisories.mageia.org/MGASA-2014-0196.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0196
Related
Published
2014-04-28T15:54:39Z
Modified
2014-04-28T15:54:11Z
Summary
Updated python-django packages fix multiple vulnerabilities
Details

Updated python-django and python-dgango14 packages fix security vulnerabilities:

Benjamin Bach discovered that Django incorrectly handled dotted Python paths when using the reverse() function. An attacker could use this issue to cause Django to import arbitrary modules from the Python path, resulting in possible code execution. (CVE-2014-0472)

Paul McMillan discovered that Django incorrectly cached certain pages that contained CSRF cookies. An attacker could possibly use this flaw to obtain a valid cookie and perform attacks which bypass the CSRF restrictions. (CVE-2014-0473)

Michael Koziarski discovered that Django did not always perform explicit conversion of certain fields when using a MySQL database. An attacker could possibly use this issue to obtain unexpected results. (CVE-2014-0474)

References
Credits

Affected packages

Mageia:3 / python-django

Package

Name
python-django
Purl
pkg:rpm/mageia/python-django?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.11-1.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / python-django

Package

Name
python-django
Purl
pkg:rpm/mageia/python-django?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.6-1.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / python-django14

Package

Name
python-django14
Purl
pkg:rpm/mageia/python-django14?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.11-1.1.mga4

Ecosystem specific

{
    "section": "core"
}