Arch Linux Security Advisory ASA-202006-8
========================================
Severity: Medium
Date    : 2020-06-06
CVE-ID  : CVE-2020-13254 CVE-2020-13596
Package : python-django
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1176

Summary
======
The package python-django before version 3.0.7-1 is vulnerable to
multiple issues including cross-site scripting and information
disclosure.

Resolution
=========
Upgrade to 3.0.7-1.

# pacman -Syu "python-django>=3.0.7-1"

The problems have been fixed upstream in version 3.0.7.

Workaround
=========
None.

Description
==========
- CVE-2020-13254 (information disclosure)

An information disclosure issue has been found in Django before 3.0.7,
via malformed memcached keys. In cases where a memcached backend does
not perform key validation, passing malformed cache keys could result
in a key collision, and potential data leakage. In order to avoid this
vulnerability, key validation is added to the memcached cache backends.

- CVE-2020-13596 (cross-site scripting)

A possible XSS has been found in Django before 3.0.7, via admin
ForeignKeyRawIdWidget. Query parameters for the admin
ForeignKeyRawIdWidget were not properly URL encoded, posing an XSS
attack vector.

Impact
=====
A remote attacker can leak data through malformed cache keys. An
authenticated user could execute javascript through an admin widget.

References
=========
https://www.djangoproject.com/weblog/2020/jun/03/security-releases/
https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693
https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
https://security.archlinux.org/CVE-2020-13254
https://security.archlinux.org/CVE-2020-13596

ArchLinux: 202006-8: python-django: multiple issues

June 9, 2020

Summary

- CVE-2020-13254 (information disclosure) An information disclosure issue has been found in Django before 3.0.7, via malformed memcached keys. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. In order to avoid this vulnerability, key validation is added to the memcached cache backends.
- CVE-2020-13596 (cross-site scripting)
A possible XSS has been found in Django before 3.0.7, via admin ForeignKeyRawIdWidget. Query parameters for the admin ForeignKeyRawIdWidget were not properly URL encoded, posing an XSS attack vector.

Resolution

Upgrade to 3.0.7-1. # pacman -Syu "python-django>=3.0.7-1"
The problems have been fixed upstream in version 3.0.7.

References

https://www.djangoproject.com/weblog/2020/jun/03/security-releases/ https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693 https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38 https://security.archlinux.org/CVE-2020-13254 https://security.archlinux.org/CVE-2020-13596

Severity
Package : python-django
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1176

Workaround

None.

Related News