Debian Python-Django vulnerabilities

149 known vulnerabilities affecting debian/python-django.

Total CVEs
149
CISA KEV
0
Public exploits
9
Exploited in wild
0
Severity breakdown
CRITICAL11HIGH40MEDIUM73LOW25

Vulnerabilities

Page 5 of 8
CVE-2019-6975LOWCVSS 7.5fixed in python-django 1:1.11.20-1 (bookworm)2019
CVE-2019-6975 [HIGH] CVE-2019-6975: python-django - Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows... Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function. Scope: local bookworm: resolved (fixed in 1:1.11.20-1) bullseye: resolved (fixed in 1:1.11.20-1) forky: resolved (fixed in 1:1.11.20-1) sid: resolved (fixed in
debian
CVE-2018-6188HIGHCVSS 7.5fixed in python-django 1:1.11.10-1 (bookworm)2018
CVE-2018-6188 [HIGH] CVE-2018-6188: python-django - django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.1... django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive. Scope: local bookworm: resolved (fixed in 1:1.11.10-1) bullseye:
debian
CVE-2018-7536MEDIUMCVSS 5.3fixed in python-django 1:1.11.11-1 (bookworm)2018
CVE-2018-7536 [MEDIUM] CVE-2018-7536: python-django - An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8... An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize an
debian
CVE-2018-7537MEDIUMCVSS 5.3fixed in python-django 1:1.11.11-1 (bookworm)2018
CVE-2018-7537 [MEDIUM] CVE-2018-7537: python-django - An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8... An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to
debian
CVE-2018-14574MEDIUMCVSS 6.1PoCfixed in python-django 1:1.11.15-1 (bookworm)2018
CVE-2018-14574 [MEDIUM] CVE-2018-14574: python-django - django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.... django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect. Scope: local bookworm: resolved (fixed in 1:1.11.15-1) bullseye: resolved (fixed in 1:1.11.15-1) forky: resolved (fixed in 1:1.11.15-1) sid: resolved (fixed in 1:1.11.15-1) trixie: resolved (fixed in 1:1.11.15-1)
debian
CVE-2018-16984LOWCVSS 4.92018
CVE-2018-16984 [MEDIUM] CVE-2018-16984: python-django - An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users ... An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those u
debian
CVE-2017-7233MEDIUMCVSS 6.1fixed in python-django 1:1.10.7-1 (bookworm)2017
CVE-2017-7233 [MEDIUM] CVE-2017-7233: python-django - Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on us... Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``i
debian
CVE-2017-7234MEDIUMCVSS 6.1fixed in python-django 1:1.10.7-1 (bookworm)2017
CVE-2017-7234 [MEDIUM] CVE-2017-7234: python-django - A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, an... A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability. Scope: local bookworm: resolved (fixed in 1:1.10.7-1) bullseye: resolved (fixed in 1:1.10.7-1) forky: resolved (fixed in 1:1.10.7-1) sid:
debian
CVE-2017-12794LOWCVSS 6.1PoCfixed in python-django 1:1.11.5-1 (bookworm)2017
CVE-2017-12794 [MEDIUM] CVE-2017-12794: python-django - In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was d... In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessibl
debian
CVE-2016-9013CRITICALCVSS 9.8fixed in python-django 1:1.10.3-1 (bookworm)2016
CVE-2016-9013 [CRITICAL] CVE-2016-9013: python-django - Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a ... Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary. S
debian
CVE-2016-2512HIGHCVSS 7.4fixed in python-django 1.9.4-1 (bookworm)2016
CVE-2016-2512 [HIGH] CVE-2016-2512: python-django - The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9... The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com. Scope: local bookworm: resolv
debian
CVE-2016-9014HIGHCVSS 8.1fixed in python-django 1:1.10.3-1 (bookworm)2016
CVE-2016-9014 [HIGH] CVE-2016-9014: python-django - Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3... Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS. Scope: local bookworm: resolved (fixed in 1:1.10.3-1) bullseye: resolved (fixed in 1:1.10.3-1) forky: resolved
debian
CVE-2016-2048MEDIUMCVSS 5.5fixed in python-django 1.9.2-1 (bookworm)2016
CVE-2016-2048 [MEDIUM] CVE-2016-2048: python-django - Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote... Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission. Scope: local bookworm: resolved (fixed in 1.9.2-1) bullseye: resolved (fixed in 1.9.2-1) forky: resolv
debian
CVE-2016-6186MEDIUMCVSS 6.1PoCfixed in python-django 1:1.9.8-1 (bookworm)2016
CVE-2016-6186 [MEDIUM] CVE-2016-6186: python-django - Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup ... Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML. Scope: local bookwo
debian
CVE-2016-2513LOWCVSS 3.1fixed in python-django 1.9.4-1 (bookworm)2016
CVE-2016-2513 [LOW] CVE-2016-2513: python-django - The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x... The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests. Scope: local bookworm: resolved (fixed in 1.9.4-1) bullseye: resolved (fixed in 1.9.4-1) forky: resolved (fixed in 1.9.4-1) sid: resolved (fixed in 1.9.4-1) trixie: resolved (fixed i
debian
CVE-2016-7401LOWCVSS 7.5fixed in python-django 1:1.10-1 (bookworm)2016
CVE-2016-7401 [HIGH] CVE-2016-7401: python-django - The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when us... The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies. Scope: local bookworm: resolved (fixed in 1:1.10-1) bullseye: resolved (fixed in 1:1.10-1) forky: resolved (fixed in 1:1.10-1) sid: resolved (fixe
debian
CVE-2015-5143HIGHCVSS 7.8fixed in python-django 1.7.9-1 (bookworm)2015
CVE-2015-5143 [HIGH] CVE-2015-5143: python-django - The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before ... The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys. Scope: local bookworm: resolved (fixed in 1.7.9-1) bullseye: resolved (fixed in 1.7.9-1) forky: resolved (fixed in 1.7.9-1) s
debian
CVE-2015-8213MEDIUMCVSS 5.0fixed in python-django 1.8.7-1 (bookworm)2015
CVE-2015-8213 [MEDIUM] CVE-2015-8213: python-django - The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11... The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY. Scope: local bookworm: resolved (fixed in 1.8.7-1) bullseye: resolved (fixed
debian
CVE-2015-2316MEDIUMCVSS 5.0fixed in python-django 1.7.7-1 (bookworm)2015
CVE-2015-2316 [MEDIUM] CVE-2015-2316: python-django - The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1... The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string. Scope: local bookworm: resolved (fixed in 1.7.7-1) bullseye: resolved (fixed in 1.7.7-1) forky: re
debian
CVE-2015-0222MEDIUMCVSS 5.0fixed in python-django 1.7.1-1.1 (bookworm)2015
CVE-2015-0222 [MEDIUM] CVE-2015-0222: python-django - ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, w... ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries. Scope: local bookworm: resolved (fixed in 1.7.1-1.1) bullseye: resolved (fixed in 1.7.1-1.1) forky: resolved (f
debian