CVE-2016-6186
Published: 18 July 2016
Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
Notes
Author | Note |
---|---|
mdeslaur | vulnerability is in RelatedObjectLookups.js. While debug.py was also changed, it doesn't contain a vulnerability, it was done as a preventative measure. Django 1.7.x and earlier don't contain the vulnerable code in RelatedObjectLookups.js. |
Priority
Status
Package | Release | Status |
---|---|---|
python-django Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(code not present)
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(1.9.8, 1.8.14)
|
|
wily |
Not vulnerable
(code not present)
|
|
xenial |
Released
(1.8.7-1ubuntu5.1)
|
|
Patches: upstream: https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158 upstream: https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |