drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in Django
Name: |
Cross-Site Scripting in Django |
|
ID: |
USN-3039-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS |
|
Datum: |
Mi, 20. Juli 2016, 07:46 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6186 |
|
Applikationen: |
Django |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0273371470368738827== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="35UAoPsiDN1gBFT4o8xW3oV7I8SG8GU65"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --35UAoPsiDN1gBFT4o8xW3oV7I8SG8GU65 Content-Type: multipart/mixed; boundary="lW7DgJ0wjomhksUm2CKEkAh0aow7uSwps" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <578E7403.8090905@canonical.com> Subject: [USN-3039-1] Django vulnerability
--lW7DgJ0wjomhksUm2CKEkAh0aow7uSwps Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3039-1 July 19, 2016
python-django vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
A security issue was fixed in Django.
Software Description: - python-django: High-level Python web development framework
Details:
It was discovered that Django incorrectly handled the admin's add/change related popup. A remote attacker could possibly use this issue to perform a cross-site scripting attack.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: python-django 1.8.7-1ubuntu5.1 python3-django 1.8.7-1ubuntu5.1
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3039-1 CVE-2016-6186
Package Information: https://launchpad.net/ubuntu/+source/python-django/1.8.7-1ubuntu5.1
--lW7DgJ0wjomhksUm2CKEkAh0aow7uSwps--
--35UAoPsiDN1gBFT4o8xW3oV7I8SG8GU65 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJXjnQDAAoJEGVp2FWnRL6TD7AP/iTW9rH1G+I1JFBHYTIO/okj FVHCGIG2mgQmKwR0QcYWiZUHrYP87uZDcYHTWUiw65ECe2cuzIcPHI3Ijvnn+WrI JXRODwRe512Qvp3YV8vNZl99cxqt+WnSFdfEEfe3WP29/SjaXSjUAtm9capDlxH1 LBI0op21s6r2f/SrW/Y/+OYoGx1SrHmmrqyjz9DnpZcfbtnt7xvXjOzD84m7QJT/ 6uMw6U8yeLClrdaEIT+2e/Et26UkG8Xb1a3+i0y6IVLYvwbnjHX91Gywpd3l2OmW fU9F4WSPgl1iYQPJ8MWHEi25cYdbwOg3JYzWZDdj71jsni5BXtKBmFTDtnTQhQqc DX7t8xXr3esGxhl2R3zFC1AiZ0fOaB5mwbWY8WBfwaZQ8MqWrffeVqCsRzj5+NpL NK/pBPv4ivXRus5R8RZ8k8m+L/WiFQG4+Phj6SyhTq19Qi3E4oeLJRxoeOmo4Jgt nL8qjb7r2yS39k6tw+DsZHCVj/lpwiPzJNDZD4E4LaH1OZtRnYJIRNosWfvblpIn r1UsKgHSDsRcLuCtkhNHaEMDMokBordkYDzcXd1xNl0DxSwan5GCH6ymuVCFpZ7L RJRJmPWb1shXparWnNowuJmo7q8/acSXwLIsK+0dvPxsjxUUcxW2vcG4ucwfH2tr Vo3hv5aNWvvuZUSJ5yZt =D+iJ -----END PGP SIGNATURE-----
--35UAoPsiDN1gBFT4o8xW3oV7I8SG8GU65--
--===============0273371470368738827== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0273371470368738827==--
|
|
|
|