Date: Wed, 19 Oct 2011 18:30:31 -0400 (EDT) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org, security@...ngoproject.com Subject: Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >Date: Sun, 11 Sep 2011 16:09:44 +0200 >multiple security flaws have been recently addressed in the v1.3.1 >and v1.2.7 versions of the Django Python Web framework ... This maps to 6 CVE identifiers (5 new ones); they're now on the CVE web site. > 1, Session manipulation, CVE-2011-4136 > 2, Denial of service attack via URLField, CVE-2011-4137 > 3, URLField redirection, 3a. "no validation of the resulting redirected URL is performed, including basic checks for supported protocols (HTTP, HTTPS and FTP) ... This issue is ultimately rooted in a bug in Python itself" CVE-2011-1521 3b. "although the initial request issued by Django uses the HEAD method for HTTP/HTTPS, the request to the target of the redirect is issued using GET. This may create further issues for systems which implicitly trust GET requests from the local machine/network." CVE-2011-4138 > 4, Host header cache poisoning, CVE-2011-4139 > 5, Host header and CSRF, CVE-2011-4140 > 6, Cross-subdomain CSRF attacks, This one is not a vulnerability for CVE. > 7, DEBUG pages and sensitive POST data This one is also not a vulnerability for CVE. - -- CVE assignment team, MITRE CVE Numbering Authority M/S S145 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through keyserver.pgp.com or pgp.mit.edu ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (SunOS) iQEcBAEBAgAGBQJOn00KAAoJEGvefgSNfHMdulcH/2CnWceFdH+bWZ6gFeC/qjU4 Q0G/tGXZC7/lUdsnABAdxzsiI91hrT17RY5s1wkSFORf+yXI0OceqxQrZdrIE15g 2YqHvDP/oN74yulVfXjr8olgSsxYtSFXVIHq3HGsydQATTFtRpgnTXbfLPb++1Qx m25y/51U4BmdyE5GYJUjQgvuo70cYAJ7G68VHJFTWtGOPzEYtGFqHXPeXr8s4y/m w4Fl4zAyI0FpNqskHy9XMQFHd3aobGzWKRKbgqZVbibkD3EaDuIKx3zGJ7uNbR3Z P6rDvY++DX4SE0TVX+5IYrCbv5GsjTaq1Rf48lwGJEYHiT+F+UnulBLXw6l6N4Q= =zq5f -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.