[ASA-201901-7] python2-django: content spoofing
Jelle van der Waa
jelle at archlinux.org
Sun Jan 13 20:48:28 UTC 2019
Arch Linux Security Advisory ASA-201901-7
=========================================
Severity: Medium
Date : 2019-01-11
CVE-ID : CVE-2019-3498
Package : python2-django
Type : content spoofing
Remote : Yes
Link : https://security.archlinux.org/AVG-838
Summary
=======
The package python2-django before version 1.11.18-1 is vulnerable to
content spoofing.
Resolution
==========
Upgrade to 1.11.18-1.
# pacman -Syu "python2-django>=1.11.18-1"
The problem has been fixed upstream in version 1.11.18.
Workaround
==========
None.
Description
===========
A content spoofing issue has been found in django before 2.1.5 and
1.11.18, where an attacker could craft a malicious URL that could make
spoofed content appear on the default page generated by the
django.views.defaults.page_not_found() view.
Impact
======
A remote attacker can spoof content on the not found page with a
maliciously crafted URL.
References
==========
https://www.djangoproject.com/weblog/2019/jan/04/security-releases/
https://github.com/django/django/commit/64d2396e83aedba3fcc84ca40f23fbd22f0b9b5b
https://github.com/django/django/commit/1cd00fcf52d089ef0fe03beabd05d59df8ea052a
https://security.archlinux.org/CVE-2019-3498
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190113/a153f24e/attachment.asc>
More information about the arch-security
mailing list