SB2011010311 - Fedora EPEL 5 update for Django



SB2011010311 - Fedora EPEL 5 update for Django

Published: January 3, 2011 Updated: April 24, 2025

Security Bulletin ID SB2011010311
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2010-4534)

The vulnerability allows a remote #AU# to gain access to sensitive information.

The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.


2) Input validation error (CVE-ID: CVE-2010-4535)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.


Remediation

Install update from vendor's website.