SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Django Vendors:   djangoproject.com
(Red Hat Issues Fix) Django Input Validation Flaw in Administrator Add/Change Popup Lets Remote Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1036591
SecurityTracker URL:  http://securitytracker.com/id/1036591
CVE Reference:   CVE-2016-6186   (Links to External Site)
Date:  Aug 11 2016
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Django. A remote user can conduct cross-site scripting attacks.

The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target administrative user's browser. The code will originate from the site running the Django software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The administrator's add/change related popup is affected.

Vulnerability Laboratory reported this vulnerability.

Impact:   A remote user can access the target administrative user's cookies (including authentication cookies), if any, associated with the site running the Django software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2016-1594.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2016-1594.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Jul 18 2016 Django Input Validation Flaw in Administrator Add/Change Popup Lets Remote Conduct Cross-Site Scripting Attacks



 Source Message Contents

Subject:  [RHSA-2016:1594-01] Moderate: python-django security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: python-django security update
Advisory ID:       RHSA-2016:1594-01
Product:           Red Hat Enterprise Linux OpenStack Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2016-1594.html
Issue date:        2016-08-10
CVE Names:         CVE-2016-6186 
=====================================================================

1. Summary:

An update for python-django is now available for Red Hat OpenStack Platform
8.0 Operational Tools for RHEL 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux OpenStack Platform 8.0 Operational Tools for RHEL 7 - noarch

3. Description:

Django is a high-level Python Web framework that encourages rapid
development and a clean, pragmatic design. It focuses on automating as much
as possible and adhering to the DRY (Don't Repeat Yourself) principle.

Security Fix(es):

* A cross-site scripting (XSS) flaw was found in Django. An attacker could
exploit the unsafe usage of JavaScript's Element.innerHTML to forge content
in the admin's add/change related popup. Element.textContent is now used to
prevent XSS data execution. (CVE-2016-6186)

Red Hat would like to thank the upstream Django project for reporting this
issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1355663 - CVE-2016-6186 django: XSS in admin's add/change related popup

6. Package List:

Red Hat Enterprise Linux OpenStack Platform 8.0 Operational Tools for RHEL 7:

Source:
python-django-1.8.14-1.el7ost.src.rpm

noarch:
python-django-1.8.14-1.el7ost.noarch.rpm
python-django-bash-completion-1.8.14-1.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-6186
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXq8lcXlSAg2UNWIIRAoNZAKCEadDe183/Hfd04xu0rj6UZprbBwCcC6VJ
qfchG6AZeBeJtP3o7smd7Bo=
=LAxz
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC