It was reported [1],[2],[3] that Django's JSON serialization does not handle escaping of any characters to make them safe for injecting into HTML. This allows an attacker who can provide part of a JSON-serializable object to craft a string that can break out of a <script> tag and create its own, injecting a custom script. To fix this, we escape '<', '>', and '&' characters in the resulting string, preventing a </script> from executing. Patches for 0.7.x [4] and 0.8.x [5] are available. [1] https://bugzilla.redhat.com/show_bug.cgi?id=1105551 [2] https://code.google.com/p/reviewboard/issues/detail?id=3406 [3] http://seclists.org/oss-sec/2014/q2/494 [4] https://reviews.reviewboard.org/r/5944/diff/ [5] https://reviews.reviewboard.org/r/5945/diff/
Created python-djblets tracking bugs for this issue: Affects: epel-6 [bug 1106859]
python-djblets-0.7.30-2.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
python-djblets-0.7.30-2.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
python-djblets-0.7.30-2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.