drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Django
Name: |
Mehrere Probleme in Django |
|
ID: |
USN-4975-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, Ubuntu 21.04 |
|
Datum: |
Mi, 2. Juni 2021, 13:27 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33571 |
|
Applikationen: |
Django |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6612296112988296930== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="0vsa3d0JxiKLNahyqS1fDhVGELjtkzrfk"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --0vsa3d0JxiKLNahyqS1fDhVGELjtkzrfk Content-Type: multipart/mixed; boundary="0p0DZrKY2wQfanJalLAXh0VsREFlhhgxu"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <70540e6e-9c97-2e88-9d7a-8a7a8cca3c77@canonical.com> Subject: [USN-4975-1] Django vulnerabilities
--0p0DZrKY2wQfanJalLAXh0VsREFlhhgxu Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4975-1 June 02, 2021
python-django vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04 - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Django.
Software Description: - python-django: High-level Python web development framework
Details:
It was discovered that the Django URLValidator function incorrectly handled newlines and tabs. A remote attacker could possibly use this issue to perform a header injection attack. This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-32052)
Rasmus Lerchedahl Petersen and Rasmus Wriedt Larsen discovered that Django incorrectly handled path sanitation in admindocs. A remote attacker could possibly use this issue to determine the existence of arbitrary files and in certain configurations obtain their contents. (CVE-2021-33203)
It was discovered that Django incorrectly handled IPv4 addresses with leading zeros. A remote attacker could possibly use this issue to perform a wide variety of attacks, including bypassing certain access restrictions. (CVE-2021-33571)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: python3-django 2:2.2.20-1ubuntu0.2
Ubuntu 20.10: python3-django 2:2.2.16-1ubuntu0.5
Ubuntu 20.04 LTS: python3-django 2:2.2.12-1ubuntu0.7
Ubuntu 18.04 LTS: python-django 1:1.11.11-1ubuntu1.14 python3-django 1:1.11.11-1ubuntu1.14
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-4975-1 CVE-2021-32052, CVE-2021-33203, CVE-2021-33571
Package Information: https://launchpad.net/ubuntu/+source/python-django/2:2.2.20-1ubuntu0.2 https://launchpad.net/ubuntu/+source/python-django/2:2.2.16-1ubuntu0.5 https://launchpad.net/ubuntu/+source/python-django/2:2.2.12-1ubuntu0.7 https://launchpad.net/ubuntu/+source/python-django/1:1.11.11-1ubuntu1.14
--0p0DZrKY2wQfanJalLAXh0VsREFlhhgxu--
--0vsa3d0JxiKLNahyqS1fDhVGELjtkzrfk Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmC3aUUACgkQZWnYVadE vpPGIQ//T4otuGcAjSreF6BmHK/FNPo8tgIIeEey2TABLaCV7Ii4LqH2G/cm9BV8 AcgqaYLhdlGHc6m+zJKSx97PY2FmUDNG8Ncoe0iGVvTK2isnrIgtnFY+VxEs9bEL SKa4C+QJQDedcBqWYSa9+q5NB5Qid+CJw1fgAsWJ7h0fNeJQII6AiQPk/Vs2U4yP UWh+QPh0raj9uEtQcB6RqyHttUEIfhTOFbP+pNI4u4DhuHEfHn6U57oRlOudGB/O ukTslqmkVZ61NMzXY20ArhXl/ShMvhRBsiYxR6wJ2lDve+94odUWxwpDLJoOpkrA c+Hd4ywcZNnft8fPeRrc5smpNto4WdmmSbkCi2A1o8SdiXSkRFmDF2DqViRax1YU /xh2mgmVdrKHN2H2doBD+tT4dALYwljou0t3yFEUZj3L2Y8oBDXbaLN1FtrdbrnB e/QvrVL79s744ZW5Kjk9vUsSBVVtipVZsoLodNiSyb/2nz/J844TAcjD5KVe/Td/ NYrHqRgCG9JTzoKiasreXmQKKrLT/f6s4HXPQXqucwo/+70/s8gJ66BMJ8z8LfO2 Zm6fV8JU74MHO3E0Kg25bYtmXiaQ3T3mGdVQr2IL3E3gUOzD/lZRAiy0BxTLjZGW mqRAqht5rYXhjBWlMpu2LhoT5YYb1Iol4QKXJhETLNky2wqlhNg= =S6gk -----END PGP SIGNATURE-----
--0vsa3d0JxiKLNahyqS1fDhVGELjtkzrfk--
--===============6612296112988296930== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============6612296112988296930==--
|
|
|
|