First published: Wed Jan 09 2019(Updated: )
It was discovered that Django incorrectly handled the default 404 page. A remote attacker could use this issue to spoof content using a malicious URL.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-django | <1:1.11.15-1ubuntu1.1 | 1:1.11.15-1ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/python3-django | <1:1.11.15-1ubuntu1.1 | 1:1.11.15-1ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/python-django | <1:1.11.11-1ubuntu1.2 | 1:1.11.11-1ubuntu1.2 |
=18.04 | ||
All of | ||
ubuntu/python3-django | <1:1.11.11-1ubuntu1.2 | 1:1.11.11-1ubuntu1.2 |
=18.04 | ||
All of | ||
ubuntu/python-django | <1.8.7-1ubuntu5.7 | 1.8.7-1ubuntu5.7 |
=16.04 | ||
All of | ||
ubuntu/python3-django | <1.8.7-1ubuntu5.7 | 1.8.7-1ubuntu5.7 |
=16.04 | ||
All of | ||
ubuntu/python-django | <1.6.11-0ubuntu1.3 | 1.6.11-0ubuntu1.3 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3851-1 is the vulnerability identifier for the Django vulnerability.
The Django vulnerability allows remote attackers to spoof content using a malicious URL.
The vulnerability affects Django versions 1.11.15-1ubuntu1.1, 1.11.11-1ubuntu1.2, 1.8.7-1ubuntu5.7, and 1.6.11-0ubuntu1.3.
To fix the Django vulnerability, update the python-django or python3-django package to versions 1:1.11.15-1ubuntu1.1 or higher.
You can find more information about the Django vulnerability at the following references: [https://ubuntu.com/security/CVE-2019-3498](https://ubuntu.com/security/CVE-2019-3498), [https://launchpad.net/ubuntu/+source/python-django/1:1.11.15-1ubuntu1.1](https://launchpad.net/ubuntu/+source/python-django/1:1.11.15-1ubuntu1.1), [https://launchpad.net/ubuntu/+source/python-django/1:1.11.11-1ubuntu1.2](https://launchpad.net/ubuntu/+source/python-django/1:1.11.11-1ubuntu1.2)