Ubuntu: 1040-1: Django vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: 1040-1: Django vulnerabilities
# 1  
Old 01-06-2011
Ubuntu: 1040-1: Django vulnerabilities

LinuxSecurity.com: Adam Baldwin discovered that Django did not properly validate query stringlookups. This could be exploited to provide an information leak to anattacker with admin privilieges. (CVE-2010-4534) [More...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
myproxy-admin-query(8)						      MyProxy						    myproxy-admin-query(8)

NAME
myproxy-admin-query - query MyProxy repository contents SYNOPSIS
myproxy-admin-query [ options ] DESCRIPTION
The myproxy-admin-query command displays information about the credentials stored in the MyProxy repository. It can also be used to remove credentials from the repository, by combining query options with --remove. It accesses the repository directly and must be run on the machine where the myproxy-server(8) is installed from the account that owns the repository. An example cron job for running myproxy-admin-query periodically to remove invalid (expired, revoked, etc.) credentials from the repository is provided at $GLOBUS_LOCATION/share/myproxy/myproxy.cron. OPTIONS
-h, --help Displays command usage text and exits. -u, --usage Displays command usage text and exits. -v, --verbose Enables verbose debugging output to the terminal. -V, --version Displays version information and exits. -l username, --username username Return information on credentials for a single username. By default, the command returns information on all credentials for all usernames. -k name, --credname name Return information on the credentials with the specified name. -o DN, --owner DN Return information on the credentials owned by the specified distinguished name. -e hours, --expiring_in hours Return information on credentials with remaining lifetime less than the specified number of hours. For example, -e 0 will return all expired credentials. -t hours, --time_left hours Return information on credentials with remaining lifetime greater than the specified number of hours. -i, --invalid Return information on invalid (expired, revoked, etc.) credentials. -s dir, --storage dir Specifies the location of the credential storage directory. The directory must be accessible only by the user running the myproxy- server process for security reasons. Default: /var/lib/myproxy or /var/myproxy or $GLOBUS_LOCATION/var/myproxy -c file, --config file Specifies the location of the myproxy-server configuration file, for OCSP options. Default: /etc/myproxy-server.config or $GLOBUS_LOCATION/etc/myproxy-server.config -r, --remove Remove the credentials matching the query from the repository. For example, myproxy-admin-query -e 0 -r will remove all expired credentials from the repository. -L 'msg', --lock 'msg' Places the credentials matching the query under an administrative lock and specifies a message to be returned on access attempts. Be sure to put the message in quotes so it is captured as one argument to the command. -U, --unlock Removes any administrative locks for the credentials matching the query. EXIT STATUS
0 on success, >0 on error AUTHORS
See http://myproxy.ncsa.uiuc.edu/about for the list of MyProxy authors. SEE ALSO
myproxy-change-pass-phrase(1), myproxy-destroy(1), myproxy-init(1), myproxy-logon(1), myproxy-retrieve(1), myproxy-store(1), myproxy- server.config(5), myproxy-admin-adduser(8), myproxy-admin-change-pass(8), myproxy-admin-load-credential(8), myproxy-server(8) MyProxy 2011-09-19 myproxy-admin-query(8)