• 公告ID (KylinSec-SA-2024-4039)

摘要:

python-django security update

安全等级: High

公告ID: KylinSec-SA-2024-4039

发布日期: 2024年10月18日

关联CVE: CVE-2024-45230   CVE-2024-45231  

  • 详细介绍

1. 漏洞描述

   

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Security Fix(es):

An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.(CVE-2024-45230)

An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).(CVE-2024-45231)

2. 影响范围

cve名称 产品 组件 是否受影响

3. 影响组件

    python-django

4. 修复版本

    无

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

    无
上一篇:KylinSec-SA-2024-4017 下一篇:KylinSec-SA-2024-4066