SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Django Vendors:   djangoproject.com
Django Bugs Let Remote Users Deny Service and Conduct HTTP/Header Response Splitting Attacks
SecurityTracker Alert ID:  1032820
SecurityTracker URL:  http://securitytracker.com/id/1032820
CVE Reference:   CVE-2015-5143, CVE-2015-5144, CVE-2015-5145   (Links to External Site)
Date:  Jul 9 2015
Impact:   Denial of service via network, Disclosure of authentication information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.4.x, 1.7.x, 1.8.x
Description:   Several vulnerabilities were reported in Django. A remote user can cause denial of service conditions on the target system. A remote user can conduct HTTP/header response splitting attacks.

A remote user can send multiple requests with specially crafted session key via a cookie to 'request.session' to cause an excessive number of session records to be created [CVE-2015-5143]. As a result, existing session records may be deleted and new session records may be prevented. Only version 1.8.x is affected.

Eric Peterson and Lin Hua Cheng reported this vulnerability.

The 'django.core.validators.URLValidator' component processes certain inputs at a slow rate [CVE-2015-5145]. A remote user can submit specially crafted data to this function to cause denial of service conditions on the target system. Only version 1.8.x is affected.

Joao Silva and Ross Brunton reported this vulnerability.

Some of the builtin validator components, including 'django.core.validators.EmailValidator', accept user-supplied newline characters [CVE-2015-5144]. A remote user can submit a specially crafted value to cause the target server to return a split response or additional header line. A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. Applications that use these validators are affected.

Sjoerd Job Postmus reported this vulnerability.

Impact:   A remote user can cause denial of service conditions.

A remote user can cause arbitrary content to be displayed or transmitted in certain cases.

A remote user may be able to poison any intermediate web caches with arbitrary content.

Solution:   The vendor has issued a fix (1.4.21, 1.7.9, 1.8.3).

The vendor's advisory is available at:

https://www.djangoproject.com/weblog/2015/jul/08/security-releases/

Vendor URL:  www.djangoproject.com/weblog/2015/jul/08/security-releases/ (Links to External Site)
Cause:   Input validation error, Resource error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 11 2015 (Ubuntu Issues Fix) Django Bugs Let Remote Users Deny Service and Conduct HTTP/Header Response Splitting Attacks
Ubuntu has issued a fix for Ubuntu 12.04 LTS, 14.04 LTS, 14.10, and 15.04.
Aug 25 2015 (Red Hat Issues Fix) Django Bugs Let Remote Users Deny Service and Conduct HTTP/Header Response Splitting Attacks
Red Hat has issued a fix for Red Hat Enterprise Linux 7.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC