[ASA-201901-6] python-django: content spoofing

Jelle van der Waa jelle at archlinux.org
Sun Jan 13 20:46:20 UTC 2019


Arch Linux Security Advisory ASA-201901-6
=========================================

Severity: Medium
Date    : 2019-01-11
CVE-ID  : CVE-2019-3498
Package : python-django
Type    : content spoofing
Remote  : Yes
Link    : https://security.archlinux.org/AVG-839

Summary
=======

The package python-django before version 2.1.5-1 is vulnerable to
content spoofing.

Resolution
==========

Upgrade to 2.1.5-1.

# pacman -Syu "python-django>=2.1.5-1"

The problem has been fixed upstream in version 2.1.5.

Workaround
==========

None.

Description
===========

A content spoofing issue has been found in django before 2.1.5 and
1.11.18, where an attacker could craft a malicious URL that could make
spoofed content appear on the default page generated by the
django.views.defaults.page_not_found() view.

Impact
======

A remote attacker can spoof content on the not found page with a
maliciously crafted URL.

References
==========

https://www.djangoproject.com/weblog/2019/jan/04/security-releases/
https://github.com/django/django/commit/64d2396e83aedba3fcc84ca40f23fbd22f0b9b5b
https://github.com/django/django/commit/1cd00fcf52d089ef0fe03beabd05d59df8ea052a
https://security.archlinux.org/CVE-2019-3498
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190113/92a1574d/attachment.asc>


More information about the arch-security mailing list