Arch Linux 754 Published by

A python-django security update has been released for Arch Linux to address multiple issues.



ASA-202006-8: python-django: multiple issues


Arch Linux Security Advisory ASA-202006-8
========================================
Severity: Medium
Date : 2020-06-06
CVE-ID : CVE-2020-13254 CVE-2020-13596
Package : python-django
Type : multiple issues
Remote : Yes
Link :   https://security.archlinux.org/AVG-1176

Summary
======
The package python-django before version 3.0.7-1 is vulnerable to
multiple issues including cross-site scripting and information
disclosure.

Resolution
=========
Upgrade to 3.0.7-1.

# pacman -Syu "python-django>=3.0.7-1"

The problems have been fixed upstream in version 3.0.7.

Workaround
=========
None.

Description
==========
- CVE-2020-13254 (information disclosure)

An information disclosure issue has been found in Django before 3.0.7,
via malformed memcached keys. In cases where a memcached backend does
not perform key validation, passing malformed cache keys could result
in a key collision, and potential data leakage. In order to avoid this
vulnerability, key validation is added to the memcached cache backends.

- CVE-2020-13596 (cross-site scripting)

A possible XSS has been found in Django before 3.0.7, via admin
ForeignKeyRawIdWidget. Query parameters for the admin
ForeignKeyRawIdWidget were not properly URL encoded, posing an XSS
attack vector.

Impact
=====
A remote attacker can leak data through malformed cache keys. An
authenticated user could execute javascript through an admin widget.

References
=========
  https://www.djangoproject.com/weblog/2020/jun/03/security-releases/
  https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693
  https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
  https://security.archlinux.org/CVE-2020-13254
  https://security.archlinux.org/CVE-2020-13596