security.txt 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. ==========================
  2. Archive of security issues
  3. ==========================
  4. Django's development team is strongly committed to responsible
  5. reporting and disclosure of security-related issues, as outlined in
  6. :doc:`Django's security policies </internals/security>`.
  7. As part of that commitment, we maintain the following historical list
  8. of issues which have been fixed and disclosed. For each issue, the
  9. list below includes the date, a brief description, the `CVE identifier
  10. <https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures>`_
  11. if applicable, a list of affected versions, a link to the full
  12. disclosure and links to the appropriate patch(es).
  13. Some important caveats apply to this information:
  14. * Lists of affected versions include only those versions of Django
  15. which had stable, security-supported releases at the time of
  16. disclosure. This means older versions (whose security support had
  17. expired) and versions which were in pre-release (alpha/beta/RC)
  18. states at the time of disclosure may have been affected, but are not
  19. listed.
  20. * The Django project has on occasion issued security advisories,
  21. pointing out potential security problems which can arise from
  22. improper configuration or from other issues outside of Django
  23. itself. Some of these advisories have received CVEs; when that is
  24. the case, they are listed here, but as they have no accompanying
  25. patches or releases, only the description, disclosure and CVE will
  26. be listed.
  27. Issues prior to Django's security process
  28. =========================================
  29. Some security issues were handled before Django had a formalized
  30. security process in use. For these, new releases may not have been
  31. issued at the time and CVEs may not have been assigned.
  32. August 16, 2006 - CVE-2007-0404
  33. -------------------------------
  34. `CVE-2007-0404 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0404&cid=3>`_: Filename validation issue in translation framework. `Full description <https://www.djangoproject.com/weblog/2006/aug/16/compilemessages/>`__
  35. Versions affected
  36. ~~~~~~~~~~~~~~~~~
  37. * Django 0.90 `(patch) <https://github.com/django/django/commit/518d406e53>`__
  38. * Django 0.91 `(patch) <https://github.com/django/django/commit/518d406e53>`__
  39. * Django 0.95 `(patch) <https://github.com/django/django/commit/a132d411c6>`__ (released January 21 2007)
  40. January 21, 2007 - CVE-2007-0405
  41. --------------------------------
  42. `CVE-2007-0405 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0405&cid=3>`_: Apparent "caching" of authenticated user. `Full description <https://www.djangoproject.com/weblog/2007/jan/21/0951/>`__
  43. Versions affected
  44. ~~~~~~~~~~~~~~~~~
  45. * Django 0.95 `(patch) <https://github.com/django/django/commit/e89f0a6558>`__
  46. Issues under Django's security process
  47. ======================================
  48. All other security issues have been handled under versions of Django's
  49. security process. These are listed below.
  50. October 26, 2007 - CVE-2007-5712
  51. --------------------------------
  52. `CVE-2007-5712 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5712&cid=3>`_: Denial-of-service via arbitrarily-large ``Accept-Language`` header. `Full description <https://www.djangoproject.com/weblog/2007/oct/26/security-fix/>`__
  53. Versions affected
  54. ~~~~~~~~~~~~~~~~~
  55. * Django 0.91 `(patch) <https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81>`__
  56. * Django 0.95 `(patch) <https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234>`__
  57. * Django 0.96 `(patch) <https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f>`__
  58. May 14, 2008 - CVE-2008-2302
  59. ----------------------------
  60. `CVE-2008-2302 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2302&cid=3>`_: XSS via admin login redirect. `Full description <https://www.djangoproject.com/weblog/2008/may/14/security/>`__
  61. Versions affected
  62. ~~~~~~~~~~~~~~~~~
  63. * Django 0.91 `(patch) <https://github.com/django/django/commit/50ce7fb57d>`__
  64. * Django 0.95 `(patch) <https://github.com/django/django/commit/50ce7fb57d>`__
  65. * Django 0.96 `(patch) <https://github.com/django/django/commit/7791e5c050>`__
  66. September 2, 2008 - CVE-2008-3909
  67. ---------------------------------
  68. `CVE-2008-3909 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3909&cid=3>`_: CSRF via preservation of POST data during admin login. `Full description <https://www.djangoproject.com/weblog/2008/sep/02/security/>`__
  69. Versions affected
  70. ~~~~~~~~~~~~~~~~~
  71. * Django 0.91 `(patch) <https://github.com/django/django/commit/44debfeaa4473bd28872c735dd3d9afde6886752>`__
  72. * Django 0.95 `(patch) <https://github.com/django/django/commit/aee48854a164382c655acb9f18b3c06c3d238e81>`__
  73. * Django 0.96 `(patch) <https://github.com/django/django/commit/7e0972bded362bc4b851c109df2c8a6548481a8e>`__
  74. July 28, 2009 - CVE-2009-2659
  75. -----------------------------
  76. `CVE-2009-2659 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2659&cid=3>`_: Directory-traversal in development server media handler. `Full description <https://www.djangoproject.com/weblog/2009/jul/28/security/>`__
  77. Versions affected
  78. ~~~~~~~~~~~~~~~~~
  79. * Django 0.96 `(patch) <https://github.com/django/django/commit/da85d76fd6>`__
  80. * Django 1.0 `(patch) <https://github.com/django/django/commit/df7f917b7f>`__
  81. October 9, 2009 - CVE-2009-3965
  82. -------------------------------
  83. `CVE-2009-3965 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3695&cid=3>`_: Denial-of-service via pathological regular expression performance. `Full description <https://www.djangoproject.com/weblog/2009/oct/09/security/>`__
  84. Versions affected
  85. ~~~~~~~~~~~~~~~~~
  86. * Django 1.0 `(patch) <https://github.com/django/django/commit/594a28a904>`__
  87. * Django 1.1 `(patch) <https://github.com/django/django/commit/e3e992e18b>`__
  88. September 8, 2010 - CVE-2010-3082
  89. ---------------------------------
  90. `CVE-2010-3082 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3082&cid=3>`_: XSS via trusting unsafe cookie value. `Full description <https://www.djangoproject.com/weblog/2010/sep/08/security-release/>`__
  91. Versions affected
  92. ~~~~~~~~~~~~~~~~~
  93. * Django 1.2 `(patch) <https://github.com/django/django/commit/7f84657b6b>`__
  94. December 22, 2010 - CVE-2010-4534
  95. ---------------------------------
  96. `CVE-2010-4534 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4534&cid=3>`_: Information leakage in administrative interface. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  97. Versions affected
  98. ~~~~~~~~~~~~~~~~~
  99. * Django 1.1 `(patch) <https://github.com/django/django/commit/17084839fd>`__
  100. * Django 1.2 `(patch) <https://github.com/django/django/commit/85207a245b>`__
  101. December 22, 2010 - CVE-2010-4535
  102. ---------------------------------
  103. `CVE-2010-4535 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4535&cid=2>`_: Denial-of-service in password-reset mechanism. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  104. Versions affected
  105. ~~~~~~~~~~~~~~~~~
  106. * Django 1.1 `(patch) <https://github.com/django/django/commit/7f8dd9cbac>`__
  107. * Django 1.2 `(patch) <https://github.com/django/django/commit/d5d8942a16>`__
  108. February 8, 2011 - CVE-2011-0696
  109. --------------------------------
  110. `CVE-2011-0696 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0696&cid=2>`_: CSRF via forged HTTP headers. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  111. Versions affected
  112. ~~~~~~~~~~~~~~~~~
  113. * Django 1.1 `(patch) <https://github.com/django/django/commit/408c5c873c>`__
  114. * Django 1.2 `(patch) <https://github.com/django/django/commit/818e70344e>`__
  115. February 8, 2011 - CVE-2011-0697
  116. --------------------------------
  117. `CVE-2011-0697 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0697&cid=2>`_: XSS via unsanitized names of uploaded files. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  118. Versions affected
  119. ~~~~~~~~~~~~~~~~~
  120. * Django 1.1 `(patch) <https://github.com/django/django/commit/1966786d2d>`__
  121. * Django 1.2 `(patch) <https://github.com/django/django/commit/1f814a9547>`__
  122. February 8, 2011 - CVE-2011-0698
  123. --------------------------------
  124. `CVE-2011-0698 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0698&cid=2>`_: Directory-traversal on Windows via incorrect path-separator handling. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  125. Versions affected
  126. ~~~~~~~~~~~~~~~~~
  127. * Django 1.1 `(patch) <https://github.com/django/django/commit/570a32a047>`__
  128. * Django 1.2 `(patch) <https://github.com/django/django/commit/194566480b>`__
  129. September 9, 2011 - CVE-2011-4136
  130. ---------------------------------
  131. `CVE-2011-4136 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4136&cid=2>`_: Session manipulation when using memory-cache-backed session. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  132. Versions affected
  133. ~~~~~~~~~~~~~~~~~
  134. * Django 1.2 `(patch) <https://github.com/django/django/commit/ac7c3a110f>`__
  135. * Django 1.3 `(patch) <https://github.com/django/django/commit/fbe2eead2f>`__
  136. September 9, 2011 - CVE-2011-4137
  137. ---------------------------------
  138. `CVE-2011-4137 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4137&cid=2>`_: Denial-of-service via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  139. Versions affected
  140. ~~~~~~~~~~~~~~~~~
  141. * Django 1.2 `(patch) <https://github.com/django/django/commit/7268f8af86>`__
  142. * Django 1.3 `(patch) <https://github.com/django/django/commit/1a76dbefdf>`__
  143. September 9, 2011 - CVE-2011-4138
  144. ---------------------------------
  145. `CVE-2011-4138 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4138&cid=2>`_: Information leakage/arbitrary request issuance via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  146. Versions affected
  147. ~~~~~~~~~~~~~~~~~
  148. * Django 1.2: `(patch) <https://github.com/django/django/commit/7268f8af86>`__
  149. * Django 1.3: `(patch) <https://github.com/django/django/commit/1a76dbefdf>`__
  150. September 9, 2011 - CVE-2011-4139
  151. ---------------------------------
  152. `CVE-2011-4139 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4139&cid=2>`_: ``Host`` header cache poisoning. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  153. Versions affected
  154. ~~~~~~~~~~~~~~~~~
  155. * Django 1.2 `(patch) <https://github.com/django/django/commit/c613af4d64>`__
  156. * Django 1.3 `(patch) <https://github.com/django/django/commit/2f7fadc38e>`__
  157. September 9, 2011 - CVE-2011-4140
  158. ---------------------------------
  159. `CVE-2011-4140 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4140&cid=2>`_: Potential CSRF via ``Host`` header. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  160. Versions affected
  161. ~~~~~~~~~~~~~~~~~
  162. This notification was an advisory only, so no patches were issued.
  163. * Django 1.2
  164. * Django 1.3
  165. July 30, 2012 - CVE-2012-3442
  166. -----------------------------
  167. `CVE-2012-3442 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3442&cid=2>`_: XSS via failure to validate redirect scheme. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  168. Versions affected
  169. ~~~~~~~~~~~~~~~~~
  170. * Django 1.3: `(patch) <https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d>`__
  171. * Django 1.4: `(patch) <https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1>`__
  172. July 30, 2012 - CVE-2012-3443
  173. -----------------------------
  174. `CVE-2012-3443 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3443&cid=2>`_: Denial-of-service via compressed image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  175. Versions affected
  176. ~~~~~~~~~~~~~~~~~
  177. * Django 1.3: `(patch) <https://github.com/django/django/commit/b2eb4787a0fff9c9993b78be5c698e85108f3446>`__
  178. * Django 1.4: `(patch) <https://github.com/django/django/commit/c14f325c4eef628bc7bfd8873c3a72aeb0219141>`__
  179. July 30, 2012 - CVE-2012-3444
  180. -----------------------------
  181. `CVE-2012-3444 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3444&cid=2>`_: Denial-of-service via large image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  182. Versions affected
  183. ~~~~~~~~~~~~~~~~~
  184. * Django 1.3 `(patch) <https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155>`__
  185. * Django 1.4 `(patch) <https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6>`__
  186. October 17, 2012 - CVE-2012-4520
  187. --------------------------------
  188. `CVE-2012-4520 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4520&cid=2>`_: ``Host`` header poisoning. `Full description <https://www.djangoproject.com/weblog/2012/oct/17/security/>`__
  189. Versions affected
  190. ~~~~~~~~~~~~~~~~~
  191. * Django 1.3 `(patch) <https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071>`__
  192. * Django 1.4 `(patch) <https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3>`__
  193. December 10, 2012 - No CVE 1
  194. ----------------------------
  195. Additional hardening of ``Host`` header handling. `Full description <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  196. Versions affected
  197. ~~~~~~~~~~~~~~~~~
  198. * Django 1.3 `(patch) <https://github.com/django/django/commit/2da4ace0bc1bc1d79bf43b368cb857f6f0cd6b1b>`__
  199. * Django 1.4 `(patch) <https://github.com/django/django/commit/319627c184e71ae267d6b7f000e293168c7b6e09>`__
  200. December 10, 2012 - No CVE 2
  201. ----------------------------
  202. Additional hardening of redirect validation. `Full description <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  203. Versions affected
  204. ~~~~~~~~~~~~~~~~~
  205. * Django 1.3: `(patch) <https://github.com/django/django/commit/1515eb46daa0897ba5ad5f0a2db8969255f1b343>`__
  206. * Django 1.4: `(patch) <https://github.com/django/django/commit/b2ae0a63aeec741f1e51bac9a95a27fd635f9652>`__
  207. February 19, 2013 - No CVE
  208. --------------------------
  209. Additional hardening of ``Host`` header handling. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  210. Versions affected
  211. ~~~~~~~~~~~~~~~~~
  212. * Django 1.3 `(patch) <https://github.com/django/django/commit/27cd872e6e36a81d0bb6f5b8765a1705fecfc253>`__
  213. * Django 1.4 `(patch) <https://github.com/django/django/commit/9936fdb11d0bbf0bd242f259bfb97bbf849d16f8>`__
  214. February 19, 2013 - CVE-2013-1664/1665
  215. --------------------------------------
  216. `CVE-2013-1664 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1664&cid=2>`_ and `CVE-2013-1665 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1665&cid=2>`_: Entity-based attacks against Python XML libraries. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  217. Versions affected
  218. ~~~~~~~~~~~~~~~~~
  219. * Django 1.3 `(patch) <https://github.com/django/django/commit/d19a27066b2247102e65412aa66917aff0091112>`__
  220. * Django 1.4 `(patch) <https://github.com/django/django/commit/1c60d07ba23e0350351c278ad28d0bd5aa410b40>`__
  221. February 19, 2013 - CVE-2013-0305
  222. ---------------------------------
  223. `CVE-2013-0305 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0305&cid=2>`_: Information leakage via admin history log. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  224. Versions affected
  225. ~~~~~~~~~~~~~~~~~
  226. * Django 1.3 `(patch) <https://github.com/django/django/commit/d3a45e10c8ac8268899999129daa27652ec0da35>`__
  227. * Django 1.4 `(patch) <https://github.com/django/django/commit/0e7861aec73702f7933ce2a93056f7983939f0d6>`__
  228. February 19, 2013 - CVE-2013-0306
  229. ---------------------------------
  230. `CVE-2013-0306 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0306&cid=2>`_: Denial-of-service via formset ``max_num`` bypass. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  231. Versions affected
  232. ~~~~~~~~~~~~~~~~~
  233. * Django 1.3 `(patch) <https://github.com/django/django/commit/d7094bbce8cb838f3b40f504f198c098ff1cf727>`__
  234. * Django 1.4 `(patch) <https://github.com/django/django/commit/0cc350a896f70ace18280410eb616a9197d862b0>`__
  235. August 13, 2013 - CVE-2013-4249
  236. -------------------------------
  237. `CVE-2013-4249 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4249&cid=2>`_: XSS via admin trusting ``URLField`` values. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  238. Versions affected
  239. ~~~~~~~~~~~~~~~~~
  240. * Django 1.5 `(patch) <https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78>`__
  241. August 13, 2013 - CVE-2013-6044
  242. -------------------------------
  243. `CVE-2013-6044 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6044&cid=2>`_: Possible XSS via unvalidated URL redirect schemes. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  244. Versions affected
  245. ~~~~~~~~~~~~~~~~~
  246. * Django 1.4 `(patch) <https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a>`__
  247. * Django 1.5 `(patch) <https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f>`__
  248. September 10, 2013 - CVE-2013-4315
  249. ----------------------------------
  250. `CVE-2013-4315 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4315&cid=2>`_ Directory-traversal via ``ssi`` template tag. `Full description <https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/>`__
  251. Versions affected
  252. ~~~~~~~~~~~~~~~~~
  253. * Django 1.4 `(patch) <https://github.com/django/django/commit/87d2750b39f6f2d54b7047225521a44dcd37e896>`__
  254. * Django 1.5 `(patch) <https://github.com/django/django/commit/988b61c550d798f9a66d17ee0511fb7a9a7f33ca>`__
  255. September 14, 2013 - CVE-2013-1443
  256. ----------------------------------
  257. CVE-2013-1443: Denial-of-service via large passwords. `Full description <https://www.djangoproject.com/weblog/2013/sep/15/security/>`__
  258. Versions affected
  259. ~~~~~~~~~~~~~~~~~
  260. * Django 1.4 `(patch <https://github.com/django/django/commit/3f3d887a6844ec2db743fee64c9e53e04d39a368>`__ and `Python compatibility fix) <https://github.com/django/django/commit/6903d1690a92aa040adfb0c8eb37cf62e4206714>`__
  261. * Django 1.5 `(patch) <https://github.com/django/django/commit/22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc>`__
  262. April 21, 2014 - CVE-2014-0472
  263. ------------------------------
  264. `CVE-2014-0472 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0472&cid=2>`_: Unexpected code execution using ``reverse()``. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  265. Versions affected
  266. ~~~~~~~~~~~~~~~~~
  267. * Django 1.4 `(patch) <https://github.com/django/django/commit/c1a8c420fe4b27fb2caf5e46d23b5712fc0ac535>`__
  268. * Django 1.5 `(patch) <https://github.com/django/django/commit/2a5bcb69f42b84464b24b5c835dca6467b6aa7f1>`__
  269. * Django 1.6 `(patch) <https://github.com/django/django/commit/4352a50871e239ebcdf64eee6f0b88e714015c1b>`__
  270. * Django 1.7 `(patch) <https://github.com/django/django/commit/546740544d7f69254a67b06a3fc7fa0c43512958>`__
  271. April 21, 2014 - CVE-2014-0473
  272. ------------------------------
  273. `CVE-2014-0473 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0473&cid=2>`_: Caching of anonymous pages could reveal CSRF token. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  274. Versions affected
  275. ~~~~~~~~~~~~~~~~~
  276. * Django 1.4 `(patch) <https://github.com/django/django/commit/1170f285ddd6a94a65f911a27788ba49ca08c0b0>`__
  277. * Django 1.5 `(patch) <https://github.com/django/django/commit/6872f42757d7ef6a97e0b6ec5db4d2615d8a2bd8>`__
  278. * Django 1.6 `(patch) <https://github.com/django/django/commit/d63e20942f3024f24cb8cd85a49461ba8a9b6736>`__
  279. * Django 1.7 `(patch) <https://github.com/django/django/commit/380545bf85cbf17fc698d136815b7691f8d023ca>`__
  280. April 21, 2014 - CVE-2014-0474
  281. ------------------------------
  282. `CVE-2014-0474 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0474&cid=2>`_: MySQL typecasting causes unexpected query results. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  283. Versions affected
  284. ~~~~~~~~~~~~~~~~~
  285. * Django 1.4 `(patch) <https://github.com/django/django/commit/aa80f498de6d687e613860933ac58433ab71ea4b>`__
  286. * Django 1.5 `(patch) <https://github.com/django/django/commit/985434fb1d6bf2335bf96c6ebf91c3674f1f399f>`__
  287. * Django 1.6 `(patch) <https://github.com/django/django/commit/5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292>`__
  288. * Django 1.7 `(patch) <https://github.com/django/django/commit/34526c2f56b863c2103655a0893ac801667e86ea>`__
  289. May 18, 2014 - CVE-2014-1418
  290. ----------------------------
  291. `CVE-2014-1418 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1418&cid=2>`_: Caches may be allowed to store and serve private data. `Full description <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
  292. Versions affected
  293. ~~~~~~~~~~~~~~~~~
  294. * Django 1.4 `(patch) <https://github.com/django/django/commit/28e23306aa53bbbb8fb87db85f99d970b051026c>`__
  295. * Django 1.5 `(patch) <https://github.com/django/django/commit/4001ec8698f577b973c5a540801d8a0bbea1205b>`__
  296. * Django 1.6 `(patch) <https://github.com/django/django/commit/1abcf3a808b35abae5d425ed4d44cb6e886dc769>`__
  297. * Django 1.7 `(patch) <https://github.com/django/django/commit/7fef18ba9e5a8b47bc24b5bb259c8bf3d3879f2a>`__
  298. May 18, 2014 - CVE-2014-3730
  299. ----------------------------
  300. `CVE-2014-3730 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3730&cid=2>`_: Malformed URLs from user input incorrectly validated. `Full description <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
  301. Versions affected
  302. ~~~~~~~~~~~~~~~~~
  303. * Django 1.4 `(patch) <https://github.com/django/django/commit/7feb54bbae3f637ab3c4dd4831d4385964f574df>`__
  304. * Django 1.5 `(patch) <https://github.com/django/django/commit/ad32c218850ad40972dcef57beb460f8c979dd6d>`__
  305. * Django 1.6 `(patch) <https://github.com/django/django/commit/601107524523bca02376a0ddc1a06c6fdb8f22f3>`__
  306. * Django 1.7 `(patch) <https://github.com/django/django/commit/e7b0cace455c2da24492660636bfd48c45a19cdf>`__
  307. August 20, 2014 - CVE-2014-0480
  308. -------------------------------
  309. `CVE-2014-0480 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0480&cid=2>`_: reverse() can generate URLs pointing to other hosts. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  310. Versions affected
  311. ~~~~~~~~~~~~~~~~~
  312. * Django 1.4 `(patch) <https://github.com/django/django/commit/c2fe73133b62a1d9e8f7a6b43966570b14618d7e>`__
  313. * Django 1.5 `(patch) <https://github.com/django/django/commit/45ac9d4fb087d21902469fc22643f5201d41a0cd>`__
  314. * Django 1.6 `(patch) <https://github.com/django/django/commit/da051da8df5e69944745072611351d4cfc6435d5>`__
  315. * Django 1.7 `(patch) <https://github.com/django/django/commit/bf650a2ee78c6d1f4544a875dcc777cf27fe93e9>`__
  316. August 20, 2014 - CVE-2014-0481
  317. -------------------------------
  318. `CVE-2014-0481 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0481&cid=2>`_: File upload denial of service. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  319. Versions affected
  320. ~~~~~~~~~~~~~~~~~
  321. * Django 1.4 `(patch) <https://github.com/django/django/commit/30042d475bf084c6723c6217a21598d9247a9c41>`__
  322. * Django 1.5 `(patch) <https://github.com/django/django/commit/26cd48e166ac4d84317c8ee6d63ac52a87e8da99>`__
  323. * Django 1.6 `(patch) <https://github.com/django/django/commit/dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1>`__
  324. * Django 1.7 `(patch) <https://github.com/django/django/commit/3123f8452cf49071be9110e277eea60ba0032216>`__
  325. August 20, 2014 - CVE-2014-0482
  326. -------------------------------
  327. `CVE-2014-0482 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0482&cid=2>`_: RemoteUserMiddleware session hijacking. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  328. Versions affected
  329. ~~~~~~~~~~~~~~~~~
  330. * Django 1.4 `(patch) <https://github.com/django/django/commit/c9e3b9949cd55f090591fbdc4a114fcb8368b6d9>`__
  331. * Django 1.5 `(patch) <https://github.com/django/django/commit/dd68f319b365f6cb38c5a6c106faf4f6142d7d88>`__
  332. * Django 1.6 `(patch) <https://github.com/django/django/commit/0268b855f9eab3377f2821164ef3e66037789e09>`__
  333. * Django 1.7 `(patch) <https://github.com/django/django/commit/1a45d059c70385fcd6f4a3955f3b4e4cc96d0150>`__
  334. August 20, 2014 - CVE-2014-0483
  335. -------------------------------
  336. `CVE-2014-0483 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0483&cid=2>`_: Data leakage via querystring manipulation in admin. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  337. Versions affected
  338. ~~~~~~~~~~~~~~~~~
  339. * Django 1.4 `(patch) <https://github.com/django/django/commit/027bd348642007617518379f8b02546abacaa6e0>`__
  340. * Django 1.5 `(patch) <https://github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446>`__
  341. * Django 1.6 `(patch) <https://github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f>`__
  342. * Django 1.7 `(patch) <https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6>`__
  343. January 13, 2015 - CVE-2015-0219
  344. --------------------------------
  345. `CVE-2015-0219 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0219&cid=2>`_:
  346. WSGI header spoofing via underscore/dash conflation.
  347. `Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  348. Versions affected
  349. ~~~~~~~~~~~~~~~~~
  350. * Django 1.4 `(patch) <https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450>`__
  351. * Django 1.6 `(patch) <https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee>`__
  352. * Django 1.7 `(patch) <https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f>`__
  353. January 13, 2015 - CVE-2015-0220
  354. --------------------------------
  355. `CVE-2015-0220 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0220&cid=2>`_: Mitigated possible XSS attack via user-supplied redirect URLs. `Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  356. Versions affected
  357. ~~~~~~~~~~~~~~~~~
  358. * Django 1.4 `(patch) <https://github.com/django/django/commit/4c241f1b710da6419d9dca160e80b23b82db7758>`__
  359. * Django 1.6 `(patch) <https://github.com/django/django/commit/72e0b033662faa11bb7f516f18a132728aa0ae28>`__
  360. * Django 1.7 `(patch) <https://github.com/django/django/commit/de67dedc771ad2edec15c1d00c083a1a084e1e89>`__
  361. January 13, 2015 - CVE-2015-0221
  362. --------------------------------
  363. `CVE-2015-0221 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0221&cid=2>`_:
  364. Denial-of-service attack against ``django.views.static.serve()``.
  365. `Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  366. Versions affected
  367. ~~~~~~~~~~~~~~~~~
  368. * Django 1.4 `(patch) <https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7>`__
  369. * Django 1.6 `(patch) <https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f>`__
  370. * Django 1.7 `(patch) <https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a>`__
  371. January 13, 2015 - CVE-2015-0222
  372. --------------------------------
  373. `CVE-2015-0222 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0222&cid=2>`_:
  374. Database denial-of-service with ``ModelMultipleChoiceField``.
  375. `Full description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  376. Versions affected
  377. ~~~~~~~~~~~~~~~~~
  378. * Django 1.6 `(patch) <https://github.com/django/django/commit/d7a06ee7e571b6dad07c0f5b519b1db02e2a476c>`__
  379. * Django 1.7 `(patch) <https://github.com/django/django/commit/bcfb47780ce7caecb409a9e9c1c314266e41d392>`__
  380. March 9, 2015 - CVE-2015-2241
  381. -----------------------------
  382. `CVE-2015-2241 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2241&cid=2>`_:
  383. XSS attack via properties in ``ModelAdmin.readonly_fields``.
  384. `Full description <https://www.djangoproject.com/weblog/2015/mar/09/security-releases/>`__
  385. Versions affected
  386. ~~~~~~~~~~~~~~~~~
  387. * Django 1.7 `(patch) <https://github.com/django/django/commit/d16e4e1d6f95e6f46bff53cc4fd0ab398b8e5059>`__
  388. * Django 1.8 `(patch) <https://github.com/django/django/commit/2654e1b93923bac55f12b4e66c5e39b16695ace5>`_
  389. March 18, 2015 - CVE-2015-2316
  390. ------------------------------
  391. `CVE-2015-2316 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2316&cid=2>`_:
  392. Denial-of-service possibility with ``strip_tags()``.
  393. `Full description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
  394. Versions affected
  395. ~~~~~~~~~~~~~~~~~
  396. * Django 1.6 `(patch) <https://github.com/django/django/commit/b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f>`__
  397. * Django 1.7 `(patch) <https://github.com/django/django/commit/e63363f8e075fa8d66326ad6a1cc3391cc95cd97>`__
  398. * Django 1.8 `(patch) <https://github.com/django/django/commit/5447709a571cd5d95971f1d5d21d4a7edcf85bbd>`__
  399. March 18, 2015 - CVE-2015-2317
  400. ------------------------------
  401. `CVE-2015-2317 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2317&cid=2>`_:
  402. Mitigated possible XSS attack via user-supplied redirect URLs.
  403. `Full description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
  404. Versions affected
  405. ~~~~~~~~~~~~~~~~~
  406. * Django 1.4 `(patch) <https://github.com/django/django/commit/2342693b31f740a422abf7267c53b4e7bc487c1b>`__
  407. * Django 1.6 `(patch) <https://github.com/django/django/commit/5510f070711540aaa8d3707776cd77494e688ef9>`__
  408. * Django 1.7 `(patch) <https://github.com/django/django/commit/2a4113dbd532ce952308992633d802dc169a75f1>`__
  409. * Django 1.8 `(patch) <https://github.com/django/django/commit/770427c2896a078925abfca2317486b284d22f04>`__
  410. May 20, 2015 - CVE-2015-3982
  411. ----------------------------
  412. `CVE-2015-3982 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3982&cid=2>`_:
  413. Fixed session flushing in the cached_db backend.
  414. `Full description <https://www.djangoproject.com/weblog/2015/may/20/security-release/>`__
  415. Versions affected
  416. ~~~~~~~~~~~~~~~~~
  417. * Django 1.8 `(patch) <https://github.com/django/django/commit/31cb25adecba930bdeee4556709f5a1c42d88fd6>`__
  418. July 8, 2015 - CVE-2015-5143
  419. ----------------------------
  420. `CVE-2015-5143 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5143&cid=2>`_:
  421. Denial-of-service possibility by filling session store.
  422. `Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  423. Versions affected
  424. ~~~~~~~~~~~~~~~~~
  425. * Django 1.8 `(patch) <https://github.com/django/django/commit/66d12d1ababa8f062857ee5eb43276493720bf16>`__
  426. * Django 1.7 `(patch) <https://github.com/django/django/commit/1828f4341ec53a8684112d24031b767eba557663>`__
  427. * Django 1.4 `(patch) <https://github.com/django/django/commit/2e47f3e401c29bc2ba5ab794d483cb0820855fb9>`__
  428. July 8, 2015 - CVE-2015-5144
  429. ----------------------------
  430. `CVE-2015-5144 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5144&cid=2>`_:
  431. Header injection possibility since validators accept newlines in input.
  432. `Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  433. Versions affected
  434. ~~~~~~~~~~~~~~~~~
  435. * Django 1.8 `(patch) <https://github.com/django/django/commit/574dd5e0b0fbb877ae5827b1603d298edc9bb2a0>`__
  436. * Django 1.7 `(patch) <https://github.com/django/django/commit/ae49b4d994656bc037513dcd064cb9ce5bb85649>`__
  437. * Django 1.4 `(patch) <https://github.com/django/django/commit/1ba1cdce7d58e6740fe51955d945b56ae51d072a>`__
  438. July 8, 2015 - CVE-2015-5145
  439. ----------------------------
  440. `CVE-2015-5145 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5145&cid=2>`_:
  441. Denial-of-service possibility in URL validation.
  442. `Full description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  443. Versions affected
  444. ~~~~~~~~~~~~~~~~~
  445. * Django 1.8 `(patch) <https://github.com/django/django/commit/8f9a4d3a2bc42f14bb437defd30c7315adbff22c>`__
  446. August 18, 2015 - CVE-2015-5963/CVE-2015-5964
  447. ---------------------------------------------
  448. `CVE-2015-5963 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5963&cid=2>`_
  449. and
  450. `CVE-2015-5964 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5964&cid=2>`_:
  451. Denial-of-service possibility in ``logout()`` view by filling session store.
  452. `Full description <https://www.djangoproject.com/weblog/2015/aug/18/security-releases/>`__
  453. Versions affected
  454. ~~~~~~~~~~~~~~~~~
  455. * Django 1.8 `(patch) <https://github.com/django/django/commit/2eb86b01d7b59be06076f6179a454d0fd0afaff6>`__
  456. * Django 1.7 `(patch) <https://github.com/django/django/commit/2f5485346ee6f84b4e52068c04e043092daf55f7>`__
  457. * Django 1.4 `(patch) <https://github.com/django/django/commit/575f59f9bc7c59a5e41a081d1f5f55fc859c5012>`__
  458. November 24, 2015 - CVE-2015-8213
  459. ---------------------------------
  460. `CVE-2015-8213 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8213&cid=2>`_:
  461. Settings leak possibility in ``date`` template filter.
  462. `Full description <https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/>`__
  463. Versions affected
  464. ~~~~~~~~~~~~~~~~~
  465. * Django 1.8 `(patch) <https://github.com/django/django/commit/9f83fc2f66f5a0bac7c291aec55df66050bb6991>`__
  466. * Django 1.7 `(patch) <https://github.com/django/django/commit/8a01c6b53169ee079cb21ac5919fdafcc8c5e172>`__
  467. February 1, 2016 - CVE-2016-2048
  468. --------------------------------
  469. `CVE-2016-2048 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2048&cid=2>`_:
  470. User with "change" but not "add" permission can create objects for ``ModelAdmin``’s with ``save_as=True``.
  471. `Full description <https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/>`__
  472. Versions affected
  473. ~~~~~~~~~~~~~~~~~
  474. * Django 1.9 `(patch) <https://github.com/django/django/commit/adbca5e4db42542575734b8e5d26961c8ada7265>`__
  475. March 1, 2016 - CVE-2016-2512
  476. -----------------------------
  477. `CVE-2016-2512 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2512&cid=2>`_:
  478. Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth.
  479. `Full description <https://www.djangoproject.com/weblog/2016/mar/01/security-releases/>`__
  480. Versions affected
  481. ~~~~~~~~~~~~~~~~~
  482. * Django 1.9 `(patch) <https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380>`__
  483. * Django 1.8 `(patch) <https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350>`__
  484. March 1, 2016 - CVE-2016-2513
  485. -----------------------------
  486. `CVE-2016-2513 <https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2513&cid=2>`_:
  487. User enumeration through timing difference on password hasher work factor upgrade.
  488. `Full description <https://www.djangoproject.com/weblog/2016/mar/01/security-releases/>`__
  489. Versions affected
  490. ~~~~~~~~~~~~~~~~~
  491. * Django 1.9 `(patch) <https://github.com/django/django/commit/af7d09b0c5c6ab68e629fd9baf736f9dd203b18e>`__
  492. * Django 1.8 `(patch) <https://github.com/django/django/commit/f4e6e02f7713a6924d16540be279909ff4091eb6>`__