• 公告ID (KylinSec-SA-2024-5000)

摘要:

python-django security update

安全等级: Critical

公告ID: KylinSec-SA-2024-5000

发布日期: 2025年3月6日

关联CVE: CVE-2024-39329   CVE-2024-39330   CVE-2024-41989   CVE-2024-41990   CVE-2024-41991   CVE-2024-42005  

  • 详细介绍

1. 漏洞描述

   

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Security Fix(es):

An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.(CVE-2024-39329)

An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.)(CVE-2024-39330)

An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.(CVE-2024-41989)

An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.(CVE-2024-41990)

An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.(CVE-2024-41991)

An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.(CVE-2024-42005)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-39329 V6 python-django Fixed
CVE-2024-39330 V6 python-django Fixed
CVE-2024-41989 V6 python-django Fixed
CVE-2024-41990 V6 python-django Fixed
CVE-2024-41991 V6 python-django Fixed
CVE-2024-42005 V6 python-django Fixed

3. 影响组件

    python-django

4. 修复版本

   

V6

软件名称 架构 版本号
python-django-help noarch 4.2.15-3.ks6
python3-Django noarch 4.2.15-3.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     python-django-help   

     python3-Django   

aarch64:

     python-django-help   

     python3-Django   

上一篇:KylinSec-SA-2024-4999 下一篇:KylinSec-SA-2024-5001