Bug 1090588 (CVE-2014-0472) - CVE-2014-0472 python-django: unexpected code execution using reverse()
Summary: CVE-2014-0472 python-django: unexpected code execution using reverse()
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-0472
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1027766 1090687 1090689 1161009
Blocks: 1090594 1129960
TreeView+ depends on / blocked
 
Reported: 2014-04-23 16:45 UTC by Vincent Danen
Modified: 2023-05-12 20:59 UTC (History)
22 users (show)

Fixed In Version: django 1.4.11, django 1.5.6, django 1.6.3, django 1.7b2
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-08-26 23:40:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0456 0 normal SHIPPED_LIVE Moderate: Django security update 2014-04-30 23:01:29 UTC
Red Hat Product Errata RHSA-2014:0457 0 normal SHIPPED_LIVE Moderate: Django security update 2014-04-30 23:01:19 UTC

Description Vincent Danen 2014-04-23 16:45:34 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-0472 to
the following vulnerability:

Name: CVE-2014-0472
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0472
Assigned: 20131219
Reference: https://www.djangoproject.com/weblog/2014/apr/21/security/

The django.core.urlresolvers.reverse function in Django before 1.4.11,
1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2
allows remote attackers to import and execute arbitrary Python modules
by leveraging a view that constructs URLs using user input and a
"dotted Python path."

Comment 2 Vincent Danen 2014-04-23 23:16:20 UTC
Note that the initial upstream patch for this introduced a regression.  The following patch corrects that regression:

https://github.com/django/django/commit/6915220ff9d6eeb2a669421d06bce9403ed6480c


The original upstream patch is:

https://github.com/django/django/commit/4352a50871e239ebcdf64eee6f0b88e714015c1b

(for the 1.6.x branch)

Comment 5 Murray McAllister 2014-04-24 01:49:22 UTC
Acknowledgements:

Red Hat would like to thank the upstream Django project for reporting this issue. Upstream acknowledges Benjamin Bach as the original reporter.

Comment 6 errata-xmlrpc 2014-04-30 19:04:45 UTC
This issue has been addressed in following products:

  OpenStack 3 for RHEL 6

Via RHSA-2014:0457 https://rhn.redhat.com/errata/RHSA-2014-0457.html

Comment 7 errata-xmlrpc 2014-04-30 19:05:15 UTC
This issue has been addressed in following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:0456 https://rhn.redhat.com/errata/RHSA-2014-0456.html


Note You need to log in before you can comment on or make changes to this bug.