CVE-2016-6186

Published on: 08/05/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Certain versions of Debian Linux from Debian contain the following vulnerability:

Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.

  • CVE-2016-6186 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.1 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED LOW LOW NONE

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
SecurityFocus www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)
Django CMS 'Editor - Snippets' Module HTML Injection Vulnerability cve.report (archive)
text/html
URL Logo BID 92058
Django security releases issued: 1.10 release candidate 1, 1.9.8, and 1.8.14 | Weblog | Django Patch
Vendor Advisory
www.djangoproject.com
text/html
URL Logo CONFIRM www.djangoproject.com/weblog/2016/jul/18/security-releases/
Full Disclosure: Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186) Mailing List
Patch
seclists.org
text/html
URL Logo FULLDISC 20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1595
[1.8.x] Fixed XSS in admin's add/change related popup. · django/[email protected] · GitHub Patch
github.com
text/html
URL Logo CONFIRM github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d
USN-3039-1: Django vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-3039-1
[1.9.x] Fixed XSS in admin's add/change related popup. · django/[email protected] · GitHub Patch
github.com
text/html
URL Logo CONFIRM github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1594
403 Forbidden Patch
Third Party Advisory
www.vulnerability-lab.com
text/plain
Inactive LinkNot Archived
MISC www.vulnerability-lab.com/get_content.php?id=1869
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1596
[SECURITY] Fedora 24 Update: python-django-1.9.8-1.fc24 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-b7e31a0b9a
Debian -- Security Information -- DSA-3622-1 python-django Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3622
[SECURITY] Fedora 23 Update: python-django-1.8.14-1.fc23 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-97ca9d52a4
Django CMS 3.3.0 - (Editor Snippet) Persistent Cross-Site Scripting www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40129
Django 3.3.0 Script Insertion ≈ Packet Storm VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html
Django Input Validation Flaw in Administrator Add/Change Popup Lets Remote Conduct Cross-Site Scripting Attacks - SecurityTracker VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036338

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationDjangoprojectDjango1.10alpha1AllAll
ApplicationDjangoprojectDjango1.10beta1AllAll
ApplicationDjangoprojectDjango1.9AllAllAll
ApplicationDjangoprojectDjango1.9.0rc1AllAll
ApplicationDjangoprojectDjango1.9.1AllAllAll
ApplicationDjangoprojectDjango1.9.2AllAllAll
ApplicationDjangoprojectDjango1.9.3AllAllAll
ApplicationDjangoprojectDjango1.9.4AllAllAll
ApplicationDjangoprojectDjango1.9.5AllAllAll
ApplicationDjangoprojectDjango1.9.6AllAllAll
ApplicationDjangoprojectDjango1.9.7AllAllAll
ApplicationDjangoprojectDjango1.10alpha1AllAll
ApplicationDjangoprojectDjango1.10beta1AllAll
ApplicationDjangoprojectDjango1.9AllAllAll
ApplicationDjangoprojectDjango1.9.0rc1AllAll
ApplicationDjangoprojectDjango1.9.1AllAllAll
ApplicationDjangoprojectDjango1.9.2AllAllAll
ApplicationDjangoprojectDjango1.9.3AllAllAll
ApplicationDjangoprojectDjango1.9.4AllAllAll
ApplicationDjangoprojectDjango1.9.5AllAllAll
ApplicationDjangoprojectDjango1.9.6AllAllAll
ApplicationDjangoprojectDjango1.9.7AllAllAll
ApplicationDjangoprojectDjangoAllAllAllAll
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.10:alpha1:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.10:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.10:alpha1:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.10:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*: