Bug 893090 (CVE-2014-0483) - VUL-0: CVE-2014-0483: python-django: data leakage via querystring manipulation in admin
Summary: VUL-0: CVE-2014-0483: python-django: data leakage via querystring manipulatio...
Status: RESOLVED FIXED
Alias: CVE-2014-0483
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2014-09-05
Assignee: Bernhard Wiedemann
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/105254/
Whiteboard: maint:released:sle11-sp3-cl4:58830 ma...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-08-22 08:52 UTC by Alexander Bergmann
Modified: 2014-09-22 18:04 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-08-22 08:52:59 UTC
Django Security releases issued

Issue: data leakage via querystring manipulation in admin (CVE-2014-0483)

Django's administrative interface, django.contrib.admin, offers a feature whereby related objects can be displayed for selection in a popup window. The mechanism for this relies on placing values in the URL and querystring which specify the related model to display and the field through which the relationship is implemented. This mechanism does perform permission checks at the level of the model class as a whole.

This mechanism did not, however, verify that the specified field actually represents a relationship between models. Thus a user with access to the admin interface, and with sufficient knowledge of model structure and the appropriate URLs, could construct popup views which would display the values of non-relationship fields, including fields the application developer had not intended to expose in such a fashion.

To remedy this, the admin interface will now, in addition to its normal permission checks, verify that the specified field does indeed represent a relationship, to a model registered with the admin, and will raise an exception if either condition is not true.

Thanks to Collin Anderson for reporting this issue.

Affected versions

    Django master development branch (currently at pre-alpha status)
    Django 1.7 (currently at release candidate status)
    Django 1.6
    Django 1.5
    Django 1.4

Patches:

Check the djangoproject.com weblog entry.


References:
https://www.djangoproject.com/weblog/2014/aug/20/security/
https://bugzilla.redhat.com/show_bug.cgi?id=1129959
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0483.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0483
Comment 1 Swamp Workflow Management 2014-08-22 09:00:00 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2014-09-05.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/58693
Comment 2 SMASH SMASH 2014-08-22 13:20:31 UTC
Affected packages:

SLE-11-SP3-CLOUD4: python-django
SLE-11-SP3-UPTU: python-django
Comment 3 Vincent Untz 2014-08-22 17:40:33 UTC
I guess we should just submit the python-django 1.5.9 as an update for Cloud 3 and Cloud 4.

Bernhard, can you take care of this?
Comment 4 Swamp Workflow Management 2014-08-22 22:00:31 UTC
bugbot adjusting priority
Comment 6 Swamp Workflow Management 2014-09-16 13:06:07 UTC
openSUSE-SU-2014:1132-1: An update that fixes 9 vulnerabilities is now available.

Category: security (moderate)
Bug References: 874950,874955,874956,877993,878641,893087,893088,893089,893090
CVE References: CVE-2014-0472,CVE-2014-0473,CVE-2014-0474,CVE-2014-0480,CVE-2014-0481,CVE-2014-0482,CVE-2014-0483,CVE-2014-1418,CVE-2014-3730
Sources used:
openSUSE 13.1 (src):    python-django-1.5.10-0.2.8.1
openSUSE 12.3 (src):    python-django-1.4.15-2.12.1
Comment 7 Marcus Meissner 2014-09-22 12:33:34 UTC
released
Comment 8 Swamp Workflow Management 2014-09-22 18:04:58 UTC
SUSE-SU-2014:1153-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 893087,893088,893089,893090
CVE References: CVE-2014-0480,CVE-2014-0481,CVE-2014-0482,CVE-2014-0483
Sources used:
SUSE Cloud 4 (src):    python-django-1.5.10-0.11.1
SUSE Cloud 3 (src):    python-django-1.5.10-0.8.1