CVE-2019-19118

Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

History

21 Nov 2024, 04:34

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/12/02/1 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/12/02/1 - Mailing List, Patch, Third Party Advisory
References () https://docs.djangoproject.com/en/dev/releases/security/ - Patch, Vendor Advisory () https://docs.djangoproject.com/en/dev/releases/security/ - Patch, Vendor Advisory
References () https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ - () https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/ -
References () https://security.gentoo.org/glsa/202004-17 - () https://security.gentoo.org/glsa/202004-17 -
References () https://security.netapp.com/advisory/ntap-20191217-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20191217-0003/ - Third Party Advisory
References () https://www.djangoproject.com/weblog/2019/dec/02/security-releases/ - Patch, Vendor Advisory () https://www.djangoproject.com/weblog/2019/dec/02/security-releases/ - Patch, Vendor Advisory

07 Nov 2023, 03:07

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/', 'name': 'FEDORA-2019-adc8990386', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ', 'name': 'https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/ -
  • () https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ -

Information

Published : 2019-12-02 14:15

Updated : 2024-11-21 04:34


NVD link : CVE-2019-19118

Mitre link : CVE-2019-19118

CVE.ORG link : CVE-2019-19118


JSON object : View

Products Affected

djangoproject

  • django

fedoraproject

  • fedora
CWE
CWE-276

Incorrect Default Permissions