An update for python-django is now available for Red Hat Enterprise LinuxOpenStack Platform 6.0 (Juno) for RHEL 7.Red Hat Product Security has rated this update as having a security impact ofModerate.
A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Django is a high-level Python Web framework that encourages rapid developmentand a clean, pragmatic design.
It focuses on automating as much as possible andadhering to the DRY (Don’t Repeat Yourself) principle.Security Fix(es):* An open-redirect flaw was found in the way Django’sdjango.utils.http.is_safe_url() function filtered authentication URLs.
Anattacker able to trick a victim into visiting a crafted URL could use this flawto redirect that victim to a malicious site. (CVE-2016-2512)* A timing attack flaw was found in the way Django’s PBKDF2PasswordHasherperformed password hashing. Passwords hashed with an older version ofPBKDF2PasswordHasher used less hashing iterations, and thus allowed an attackerto enumerate existing users based on the time differences in the login requests.(CVE-2016-2513)Red Hat would like to thank the Django project for reporting these issues.
1311431 – CVE-2016-2512 python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth1311438 – CVE-2016-2513 python-django: User enumeration through timing difference on password hasher work factor upgrade
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: