USN-2169-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-2169-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2169-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2169-1
Related
Published
2014-04-22T11:58:31.107433Z
Modified
2014-04-22T11:58:31.107433Z
Summary
python-django vulnerabilities
Details

Benjamin Bach discovered that Django incorrectly handled dotted Python paths when using the reverse() function. An attacker could use this issue to cause Django to import arbitrary modules from the Python path, resulting in possible code execution. (CVE-2014-0472)

Paul McMillan discovered that Django incorrectly cached certain pages that contained CSRF cookies. An attacker could possibly use this flaw to obtain a valid cookie and perform attacks which bypass the CSRF restrictions. (CVE-2014-0473)

Michael Koziarski discovered that Django did not always perform explicit conversion of certain fields when using a MySQL database. An attacker could possibly use this issue to obtain unexpected results. (CVE-2014-0474)

References

Affected packages

Ubuntu:14.04:LTS / python-django

Package

Name
python-django
Purl
pkg:deb/ubuntu/python-django?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.1-2ubuntu0.1

Affected versions

1.*

1.5.4-1ubuntu1
1.6-1
1.6.1-1
1.6.1-2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.6.1-2ubuntu0.1",
            "binary_name": "python-django"
        },
        {
            "binary_version": "1.6.1-2ubuntu0.1",
            "binary_name": "python-django-doc"
        }
    ]
}