MGASA-2016-0096

Source
https://advisories.mageia.org/MGASA-2016-0096.html
Import Source
https://advisories.mageia.org/MGASA-2016-0096.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0096
Related
Published
2016-03-07T11:20:30Z
Modified
2016-03-07T11:12:18Z
Summary
Updated python-django packages fix security vulnerability
Details

Mark Striemer discovered that Django incorrectly handled user-supplied redirect URLs containing basic authentication credentials. A remote attacker could possibly use this issue to perform a cross-site scripting attack or a malicious redirect. (CVE-2016-2512)

Sjoerd Job Postmus discovered that Django incorrectly handled timing when doing password hashing operations. A remote attacker could possibly use this issue to perform user enumeration. (CVE-2016-2513)

References
Credits

Affected packages

Mageia:5 / python-django

Package

Name
python-django
Purl
pkg:rpm/mageia/python-django?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.10-1.mga5

Ecosystem specific

{
    "section": "core"
}