Page 9 of 55 results (0.011 seconds)

CVSS: 5.0EPSS: 3%CPEs: 22EXPL: 0

The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521. La funcionalidad verify_exists de la implementación de URLField en Django en versiones anteriores a 1.2.7 y 1.3.x anteriores a 1.3.1 se basa en librerías Python que tratan de acceder a URLs arbitrarias sin un temporizador, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de todos los recursos) a través de una URL asociada con (1) una respuesta lenta, (2) una conexión TCP completa sin datos enviados o (3) una gran cantidad de datos de aplicación. Un problema relacionado con CVE-2011-1521. • http://openwall.com/lists/oss-security/2011/09/11/1 http://openwall.com/lists/oss-security/2011/09/13/2 http://openwall.com/lists/oss-security/2011/09/15/5 http://secunia.com/advisories/46614 http://www.debian.org/security/2011/dsa-2332 https://bugzilla.redhat.com/show_bug.cgi?id=737366 https://hermes.opensuse.org/messages/14700881 https://www.djangoproject.com/weblog/2011/sep/09 https://www.djangoproject.com/weblog/2011/sep/10/127 • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload. Vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Django v1.1.x anteriores a v1.1.4 y v1.2.x anteriores a v1.2.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del nombre de fichero vinculado a la subida de un archivo. • http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html http://openwall.com/lists/oss-security/2011/02/09/6 http://secunia.com/advisories/43230 http://secunia.com/advisories/43297 http://secunia.com/advisories/43382 http://secunia.com/advisories/43426 http://www.debian.org/security/2011/dsa-2163 http://www.djangoproject.com/weblog/2011/feb/08/security http://www.mandriva& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 9EXPL: 0

Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447. Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 no valida correctamente las solicitudes HTTP que contienen una cabecera X-Requested-With , que facilita a los atacantes remotos para llevar a cabo ataques de vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) , permite a atacantes remotos secuestrar la autenticación de los administradores mediante peticiones AJAX manipuladas que aprovechan una "combinación de complementos del navegador y redirecciones, esta vulnerabilidad esta relacionada con CVE-2011-0447. • http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html http://openwall.com/lists/oss-security/2011/02/09/6 http://secunia.com/advisories/43230 http://secunia.com/advisories/43297 http://secunia.com/advisories/43382 http://secunia.com/advisories/43426 http://www.debian.org/security/2011/dsa-2163 http://www.djangoproject.com/weblog/2011/feb/08/security http://www.mandriva& • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 0

Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays. Vulnerabilidad de salto de directorio en Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 en Windows, cuando está habilitado permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres /(barra) en la llave de una cookie de sesión , relacionada con la repetición de sesiones. • http://openwall.com/lists/oss-security/2011/02/09/6 http://secunia.com/advisories/43230 http://www.djangoproject.com/weblog/2011/feb/08/security http://www.mandriva.com/security/advisories?name=MDVSA-2011:031 http://www.securityfocus.com/bid/46296 http://www.vupen.com/english/advisories/2011/0372 http://www.vupen.com/english/advisories/2011/0439 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 13%CPEs: 16EXPL: 0

The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer. La funcionalidad de restablecimiento de contraseña en django.contrib.auth en Django antes de v1.1.3, v1.2.x antes de v1.2.4, y v1.3.x antes de v1.3 beta 1 no valida la longitud de una cadena que representa una marca de tiempo en base36, que permite a atacantes remotos ausar una denegación de servicio (consumo de recursos) a través de una URL que especifica un gran número entero en base36. • http://code.djangoproject.com/changeset/15032 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html http://secunia.com/advisories/42715 http://secunia.com/advisories/42827 http://secunia.com/advisories/42913 http://www.djangoproject.com/weblog/2010/dec/22/security http://www.openwall.com/lists/oss-security/2010/12/23/4 http://www.openwall.com/lists/oss-security/2011/01/03 • CWE-20: Improper Input Validation •