security.txt 56 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580
  1. ==========================
  2. Archive of security issues
  3. ==========================
  4. Django's development team is strongly committed to responsible
  5. reporting and disclosure of security-related issues, as outlined in
  6. :doc:`Django's security policies </internals/security>`.
  7. As part of that commitment, we maintain the following historical list
  8. of issues which have been fixed and disclosed. For each issue, the
  9. list below includes the date, a brief description, the `CVE identifier
  10. <https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures>`_
  11. if applicable, a list of affected versions, a link to the full
  12. disclosure and links to the appropriate patch(es).
  13. Some important caveats apply to this information:
  14. * Lists of affected versions include only those versions of Django
  15. which had stable, security-supported releases at the time of
  16. disclosure. This means older versions (whose security support had
  17. expired) and versions which were in pre-release (alpha/beta/RC)
  18. states at the time of disclosure may have been affected, but are not
  19. listed.
  20. * The Django project has on occasion issued security advisories,
  21. pointing out potential security problems which can arise from
  22. improper configuration or from other issues outside of Django
  23. itself. Some of these advisories have received CVEs; when that is
  24. the case, they are listed here, but as they have no accompanying
  25. patches or releases, only the description, disclosure and CVE will
  26. be listed.
  27. Issues under Django's security process
  28. ======================================
  29. All security issues have been handled under versions of Django's security
  30. process. These are listed below.
  31. September 3, 2024 - :cve:`2024-45231`
  32. -------------------------------------
  33. Potential user email enumeration via response status on password reset.
  34. `Full description
  35. <https://www.djangoproject.com/weblog/2024/sep/03/security-releases/>`__
  36. * Django 5.1 :commit:`(patch) <3c733c78d6f8e50296d6e248968b6516c92a53ca>`
  37. * Django 5.0 :commit:`(patch) <96d84047715ea1715b4bd1594e46122b8a77b9e2>`
  38. * Django 4.2 :commit:`(patch) <bf4888d317ba4506d091eeac6e8b4f1fcc731199>`
  39. September 3, 2024 - :cve:`2024-45230`
  40. -------------------------------------
  41. Potential denial-of-service vulnerability in ``django.utils.html.urlize()``.
  42. `Full description
  43. <https://www.djangoproject.com/weblog/2024/sep/03/security-releases/>`__
  44. * Django 5.1 :commit:`(patch) <022ab0a75c76ab2ea31dfcc5f2cf5501e378d397>`
  45. * Django 5.0 :commit:`(patch) <813de2672bd7361e9a453ab62cd6e52f96b6525b>`
  46. * Django 4.2 :commit:`(patch) <d147a8ebbdf28c17cafbbe2884f0bc57e2bf82e2>`
  47. August 6, 2024 - :cve:`2024-42005`
  48. ----------------------------------
  49. Potential SQL injection in ``QuerySet.values()`` and ``values_list()``.
  50. `Full description
  51. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  52. * Django 5.0 :commit:`(patch) <32ebcbf2e1fe3e5ba79a6554a167efce81f7422d>`
  53. * Django 4.2 :commit:`(patch) <f4af67b9b41e0f4c117a8741da3abbd1c869ab28>`
  54. August 6, 2024 - :cve:`2024-41991`
  55. ----------------------------------
  56. Potential denial-of-service vulnerability in ``django.utils.html.urlize()`` and
  57. ``AdminURLFieldWidget``. `Full description
  58. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  59. * Django 5.0 :commit:`(patch) <523da8771bce321023f490f70d71a9e973ddc927>`
  60. * Django 4.2 :commit:`(patch) <efea1ef7e2190e3f77ca0651b5458297bc0f6a9f>`
  61. August 6, 2024 - :cve:`2024-41990`
  62. ----------------------------------
  63. Potential denial-of-service vulnerability in ``django.utils.html.urlize()``.
  64. `Full description
  65. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  66. * Django 5.0 :commit:`(patch) <7b7b909579c8311c140c89b8a9431bf537febf93>`
  67. * Django 4.2 :commit:`(patch) <d0a82e26a74940bf0c78204933c3bdd6a283eb88>`
  68. August 6, 2024 - :cve:`2024-41989`
  69. ----------------------------------
  70. Potential memory exhaustion in ``django.utils.numberformat.floatformat()``.
  71. `Full description
  72. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  73. * Django 5.0 :commit:`(patch) <27900fe56f3d3cabb4aeb6ccb82f92bab29073a8>`
  74. * Django 4.2 :commit:`(patch) <fc76660f589ac07e45e9cd34ccb8087aeb11904b>`
  75. July 9, 2024 - :cve:`2024-39614`
  76. --------------------------------
  77. Potential denial-of-service in
  78. ``django.utils.translation.get_supported_language_variant()``.
  79. `Full description
  80. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  81. * Django 5.0 :commit:`(patch) <8e7a44e4bec0f11474699c3111a5e0a45afe7f49>`
  82. * Django 4.2 :commit:`(patch) <17358fb35fb7217423d4c4877ccb6d1a3a40b1c3>`
  83. July 9, 2024 - :cve:`2024-39330`
  84. --------------------------------
  85. Potential directory-traversal in ``django.core.files.storage.Storage.save()``.
  86. `Full description
  87. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  88. * Django 5.0 :commit:`(patch) <9f4f63e9ebb7bf6cb9547ee4e2526b9b96703270>`
  89. * Django 4.2 :commit:`(patch) <2b00edc0151a660d1eb86da4059904a0fc4e095e>`
  90. July 9, 2024 - :cve:`2024-39329`
  91. --------------------------------
  92. Username enumeration through timing difference for users with unusable
  93. passwords. `Full description
  94. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  95. * Django 5.0 :commit:`(patch) <07cefdee4a9d1fcd9a3a631cbd07c78defd1923b>`
  96. * Django 4.2 :commit:`(patch) <156d3186c96e3ec2ca73b8b25dc2ef366e38df14>`
  97. July 9, 2024 - :cve:`2024-38875`
  98. --------------------------------
  99. Potential denial-of-service in ``django.utils.html.urlize()``.
  100. `Full description
  101. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  102. * Django 5.0 :commit:`(patch) <7285644640f085f41d60ab0c8ae4e9153f0485db>`
  103. * Django 4.2 :commit:`(patch) <79f368764295df109a37192f6182fb6f361d85b5>`
  104. March 4, 2024 - :cve:`2024-27351`
  105. ---------------------------------
  106. Potential regular expression denial-of-service in
  107. ``django.utils.text.Truncator.words()``. `Full description
  108. <https://www.djangoproject.com/weblog/2024/mar/04/security-releases/>`__
  109. * Django 5.0 :commit:`(patch) <3394fc6132436eca89e997083bae9985fb7e761e>`
  110. * Django 4.2 :commit:`(patch) <3c9a2771cc80821e041b16eb36c1c37af5349d4a>`
  111. * Django 3.2 :commit:`(patch) <072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521>`
  112. February 6, 2024 - :cve:`2024-24680`
  113. ------------------------------------
  114. Potential denial-of-service in ``intcomma`` template filter.
  115. `Full description
  116. <https://www.djangoproject.com/weblog/2024/feb/06/security-releases/>`__
  117. * Django 5.0 :commit:`(patch) <16a8fe18a3b81250f4fa57e3f93f0599dc4895bc>`
  118. * Django 4.2 :commit:`(patch) <572ea07e84b38ea8de0551f4b4eda685d91d09d2>`
  119. * Django 3.2 :commit:`(patch) <c1171ffbd570db90ca206c30f8e2b9f691243820>`
  120. November 1, 2023 - :cve:`2023-46695`
  121. ------------------------------------
  122. Potential denial of service vulnerability in ``UsernameField`` on Windows.
  123. `Full description
  124. <https://www.djangoproject.com/weblog/2023/nov/01/security-releases/>`__
  125. * Django 4.2 :commit:`(patch) <048a9ebb6ea468426cb4e57c71572cbbd975517f>`
  126. * Django 4.1 :commit:`(patch) <4965bfdde2e5a5c883685019e57d123a3368a75e>`
  127. * Django 3.2 :commit:`(patch) <f9a7fb8466a7ba4857eaf930099b5258f3eafb2b>`
  128. October 4, 2023 - :cve:`2023-43665`
  129. -----------------------------------
  130. Denial-of-service possibility in ``django.utils.text.Truncator``.
  131. `Full description
  132. <https://www.djangoproject.com/weblog/2023/oct/04/security-releases/>`__
  133. * Django 4.2 :commit:`(patch) <be9c27c4d18c2e6a5be8af4e53c0797440794473>`
  134. * Django 4.1 :commit:`(patch) <c7b7024742250414e426ad49fb80db943e7ba4e8>`
  135. * Django 3.2 :commit:`(patch) <ccdade1a0262537868d7ca64374de3d957ca50c5>`
  136. September 4, 2023 - :cve:`2023-41164`
  137. -------------------------------------
  138. Potential denial of service vulnerability in
  139. ``django.utils.encoding.uri_to_iri()``. `Full description
  140. <https://www.djangoproject.com/weblog/2023/sep/04/security-releases/>`__
  141. * Django 4.2 :commit:`(patch) <9c51b4dcfa0cefcb48231f4d71cafa80821f87b9>`
  142. * Django 4.1 :commit:`(patch) <ba00bc5ec6a7eff5e08be438f7b5b0e9574e8ff0>`
  143. * Django 3.2 :commit:`(patch) <6f030b1149bd8fa4ba90452e77cb3edc095ce54e>`
  144. July 3, 2023 - :cve:`2023-36053`
  145. --------------------------------
  146. Potential regular expression denial of service vulnerability in
  147. ``EmailValidator``/``URLValidator``. `Full description
  148. <https://www.djangoproject.com/weblog/2023/jul/03/security-releases/>`__
  149. * Django 4.2 :commit:`(patch) <b7c5feb35a31799de6e582ad6a5a91a9de74e0f9>`
  150. * Django 4.1 :commit:`(patch) <beb3f3d55940d9aa7198bf9d424ab74e873aec3d>`
  151. * Django 3.2 :commit:`(patch) <454f2fb93437f98917283336201b4048293f7582>`
  152. May 3, 2023 - :cve:`2023-31047`
  153. -------------------------------
  154. Potential bypass of validation when uploading multiple files using one form
  155. field. `Full description
  156. <https://www.djangoproject.com/weblog/2023/may/03/security-releases/>`__
  157. * Django 4.2 :commit:`(patch) <21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd>`
  158. * Django 4.1 :commit:`(patch) <e7c3a2ccc3a562328600be05068ed9149e12ce64>`
  159. * Django 3.2 :commit:`(patch) <eed53d0011622e70b936e203005f0e6f4ac48965>`
  160. February 14, 2023 - :cve:`2023-24580`
  161. -------------------------------------
  162. Potential denial-of-service vulnerability in file uploads. `Full description
  163. <https://www.djangoproject.com/weblog/2023/feb/14/security-releases/>`__
  164. * Django 4.1 :commit:`(patch) <628b33a854a9c68ec8a0c51f382f304a0044ec92>`
  165. * Django 4.0 :commit:`(patch) <83f1ea83e4553e211c1c5a0dfc197b66d4e50432>`
  166. * Django 3.2 :commit:`(patch) <a665ed5179f5bbd3db95ce67286d0192eff041d8>`
  167. February 1, 2023 - :cve:`2023-23969`
  168. ------------------------------------
  169. Potential denial-of-service via ``Accept-Language`` headers. `Full description
  170. <https://www.djangoproject.com/weblog/2023/feb/01/security-releases/>`__
  171. * Django 4.1 :commit:`(patch) <9d7bd5a56b1ce0576e8e07a8001373576d277942>`
  172. * Django 4.0 :commit:`(patch) <4452642f193533e288a52c02efb5bbc766a68f95>`
  173. * Django 3.2 :commit:`(patch) <c7e0151fdf33e1b11d488b6f67b94fdf3a30614a>`
  174. October 4, 2022 - :cve:`2022-41323`
  175. -----------------------------------
  176. Potential denial-of-service vulnerability in internationalized URLs. `Full
  177. description
  178. <https://www.djangoproject.com/weblog/2022/oct/04/security-releases/>`__
  179. * Django 4.1 :commit:`(patch) <9d656ea51d9ea7105c0c0785783ac29d426a7d25>`
  180. * Django 4.0 :commit:`(patch) <23f0093125ac2e553da6c1b2f9988eb6a3dd2ea1>`
  181. * Django 3.2 :commit:`(patch) <5b6b257fa7ec37ff27965358800c67e2dd11c924>`
  182. August 3, 2022 - :cve:`2022-36359`
  183. ----------------------------------
  184. Potential reflected file download vulnerability in FileResponse. `Full
  185. description
  186. <https://www.djangoproject.com/weblog/2022/aug/03/security-releases/>`__
  187. * Django 4.0 :commit:`(patch) <b7d9529cbe0af4adabb6ea5d01ed8dcce3668fb3>`
  188. * Django 3.2 :commit:`(patch) <b3e4494d759202a3b6bf247fd34455bf13be5b80>`
  189. July 4, 2022 - :cve:`2022-34265`
  190. --------------------------------
  191. Potential SQL injection via ``Trunc(kind)`` and ``Extract(lookup_name)``
  192. arguments. `Full description
  193. <https://www.djangoproject.com/weblog/2022/jul/04/security-releases/>`__
  194. * Django 4.0 :commit:`(patch) <0dc9c016fadb71a067e5a42be30164e3f96c0492>`
  195. * Django 3.2 :commit:`(patch) <a9010fe5555e6086a9d9ae50069579400ef0685e>`
  196. April 11, 2022 - :cve:`2022-28346`
  197. ----------------------------------
  198. Potential SQL injection in ``QuerySet.annotate()``, ``aggregate()``, and
  199. ``extra()``. `Full description
  200. <https://www.djangoproject.com/weblog/2022/apr/11/security-releases/>`__
  201. * Django 4.0 :commit:`(patch) <800828887a0509ad1162d6d407e94d8de7eafc60>`
  202. * Django 3.2 :commit:`(patch) <2044dac5c6968441be6f534c4139bcf48c5c7e48>`
  203. * Django 2.2 :commit:`(patch) <2c09e68ec911919360d5f8502cefc312f9e03c5d>`
  204. April 11, 2022 - :cve:`2022-28347`
  205. ----------------------------------
  206. Potential SQL injection via ``QuerySet.explain(**options)`` on PostgreSQL.
  207. `Full description
  208. <https://www.djangoproject.com/weblog/2022/apr/11/security-releases/>`__
  209. * Django 4.0 :commit:`(patch) <00b0fc50e1738c7174c495464a5ef069408a4402>`
  210. * Django 3.2 :commit:`(patch) <9e19accb6e0a00ba77d5a95a91675bf18877c72d>`
  211. * Django 2.2 :commit:`(patch) <29a6c98b4c13af82064f993f0acc6e8fafa4d3f5>`
  212. February 1, 2022 - :cve:`2022-22818`
  213. ------------------------------------
  214. Possible XSS via ``{% debug %}`` template tag. `Full description
  215. <https://www.djangoproject.com/weblog/2022/feb/01/security-releases/>`__
  216. Versions affected
  217. ~~~~~~~~~~~~~~~~~
  218. * Django 4.0 :commit:`(patch) <01422046065d2b51f8f613409cad2c81b39487e5>`
  219. * Django 3.2 :commit:`(patch) <1a1e8278c46418bde24c86a65443b0674bae65e2>`
  220. * Django 2.2 :commit:`(patch) <c27a7eb9f40b64990398978152e62b6ff839c2e6>`
  221. February 1, 2022 - :cve:`2022-23833`
  222. ------------------------------------
  223. Denial-of-service possibility in file uploads. `Full description
  224. <https://www.djangoproject.com/weblog/2022/feb/01/security-releases/>`__
  225. Versions affected
  226. ~~~~~~~~~~~~~~~~~
  227. * Django 4.0 :commit:`(patch) <f9c7d48fdd6f198a6494a9202f90242f176e4fc9>`
  228. * Django 3.2 :commit:`(patch) <d16133568ef9c9b42cb7a08bdf9ff3feec2e5468>`
  229. * Django 2.2 :commit:`(patch) <c477b761804984c932704554ad35f78a2e230c6a>`
  230. January 4, 2022 - :cve:`2021-45452`
  231. ------------------------------------
  232. Potential directory-traversal via ``Storage.save()``. `Full description
  233. <https://www.djangoproject.com/weblog/2022/jan/04/security-releases/>`__
  234. Versions affected
  235. ~~~~~~~~~~~~~~~~~
  236. * Django 4.0 :commit:`(patch) <e1592e0f26302e79856cc7f2218ae848ae19b0f6>`
  237. * Django 3.2 :commit:`(patch) <8d2f7cff76200cbd2337b2cf1707e383eb1fb54b>`
  238. * Django 2.2 :commit:`(patch) <4cb35b384ceef52123fc66411a73c36a706825e1>`
  239. January 4, 2022 - :cve:`2021-45116`
  240. ------------------------------------
  241. Potential information disclosure in ``dictsort`` template filter. `Full
  242. description
  243. <https://www.djangoproject.com/weblog/2022/jan/04/security-releases/>`__
  244. Versions affected
  245. ~~~~~~~~~~~~~~~~~
  246. * Django 4.0 :commit:`(patch) <2a8ec7f546d6d5806e221ec948c5146b55bd7489>`
  247. * Django 3.2 :commit:`(patch) <c7fe895bca06daf12cc1670b56eaf72a1ef27a16>`
  248. * Django 2.2 :commit:`(patch) <c9f648ccfac5ab90fb2829a66da4f77e68c7f93a>`
  249. January 4, 2022 - :cve:`2021-45115`
  250. ------------------------------------
  251. Denial-of-service possibility in ``UserAttributeSimilarityValidator``. `Full
  252. description
  253. <https://www.djangoproject.com/weblog/2022/jan/04/security-releases/>`__
  254. Versions affected
  255. ~~~~~~~~~~~~~~~~~
  256. * Django 4.0 :commit:`(patch) <df79ef03ac867c93caaa6be56bc69e66abfeef8f>`
  257. * Django 3.2 :commit:`(patch) <a8b32fe13bcaed1c0b772fdc53de84abc224fb20>`
  258. * Django 2.2 :commit:`(patch) <2135637fdd5ce994de110affef9e67dffdf77277>`
  259. December 7, 2021 - :cve:`2021-44420`
  260. ------------------------------------
  261. Potential bypass of an upstream access control based on URL paths. `Full
  262. description
  263. <https://www.djangoproject.com/weblog/2021/dec/07/security-releases/>`__
  264. Versions affected
  265. ~~~~~~~~~~~~~~~~~
  266. * Django 3.2 :commit:`(patch) <333c65603032c377e682cdbd7388657a5463a05a>`
  267. * Django 3.1 :commit:`(patch) <22bd17488159601bf0741b70ae7932bffea8eced>`
  268. * Django 2.2 :commit:`(patch) <7cf7d74e8a754446eeb85cacf2fef1247e0cb6d7>`
  269. July 1, 2021 - :cve:`2021-35042`
  270. --------------------------------
  271. Potential SQL injection via unsanitized ``QuerySet.order_by()`` input. `Full
  272. description
  273. <https://www.djangoproject.com/weblog/2021/jul/01/security-releases/>`__
  274. Versions affected
  275. ~~~~~~~~~~~~~~~~~
  276. * Django 3.2 :commit:`(patch) <a34a5f724c5d5adb2109374ba3989ebb7b11f81f>`
  277. * Django 3.1 :commit:`(patch) <0bd57a879a0d54920bb9038a732645fb917040e9>`
  278. June 2, 2021 - :cve:`2021-33203`
  279. --------------------------------
  280. Potential directory traversal via ``admindocs``. `Full description
  281. <https://www.djangoproject.com/weblog/2021/jun/02/security-releases/>`__
  282. Versions affected
  283. ~~~~~~~~~~~~~~~~~
  284. * Django 3.2 :commit:`(patch) <dfaba12cda060b8b292ae1d271b44bf810b1c5b9>`
  285. * Django 3.1 :commit:`(patch) <20c67a0693c4ede2b09af02574823485e82e4c8f>`
  286. * Django 2.2 :commit:`(patch) <053cc9534d174dc89daba36724ed2dcb36755b90>`
  287. June 2, 2021 - :cve:`2021-33571`
  288. --------------------------------
  289. Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted
  290. leading zeros in IPv4 addresses. `Full description
  291. <https://www.djangoproject.com/weblog/2021/jun/02/security-releases/>`__
  292. Versions affected
  293. ~~~~~~~~~~~~~~~~~
  294. * Django 3.2 :commit:`(patch) <9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d>`
  295. * Django 3.1 :commit:`(patch) <203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e>`
  296. * Django 2.2 :commit:`(patch) <f27c38ab5d90f68c9dd60cabef248a570c0be8fc>`
  297. May 6, 2021 - :cve:`2021-32052`
  298. -------------------------------
  299. Header injection possibility since ``URLValidator`` accepted newlines in input
  300. on Python 3.9.5+. `Full description
  301. <https://www.djangoproject.com/weblog/2021/may/06/security-releases/>`__
  302. Versions affected
  303. ~~~~~~~~~~~~~~~~~
  304. * Django 3.2 :commit:`(patch) <2d2c1d0c97832860fbd6597977e2aae17dd7e5b2>`
  305. * Django 3.1 :commit:`(patch) <afb23f5929944a407e4990edef1c7806a94c9879>`
  306. * Django 2.2 :commit:`(patch) <d9594c4ea57b6309d93879805302cec9ae9f23ff>`
  307. May 4, 2021 - :cve:`2021-31542`
  308. -------------------------------
  309. Potential directory-traversal via uploaded files. `Full description
  310. <https://www.djangoproject.com/weblog/2021/may/04/security-releases/>`__
  311. Versions affected
  312. ~~~~~~~~~~~~~~~~~
  313. * Django 3.2 :commit:`(patch) <c98f446c188596d4ba6de71d1b77b4a6c5c2a007>`
  314. * Django 3.1 :commit:`(patch) <25d84d64122c15050a0ee739e859f22ddab5ac48>`
  315. * Django 2.2 :commit:`(patch) <04ac1624bdc2fa737188401757cf95ced122d26d>`
  316. April 6, 2021 - :cve:`2021-28658`
  317. ---------------------------------
  318. Potential directory-traversal via uploaded files. `Full description
  319. <https://www.djangoproject.com/weblog/2021/apr/06/security-releases/>`__
  320. Versions affected
  321. ~~~~~~~~~~~~~~~~~
  322. * Django 3.2 :commit:`(patch) <2820fd1be5dfccbf1216c3845fad8580502473e1>`
  323. * Django 3.1 :commit:`(patch) <cca0d98118cccf9ae0c6dcf2d6c57fc50469fbf0>`
  324. * Django 3.0 :commit:`(patch) <e7fba62248f604c76da4f23dcf1db4a57b0808ea>`
  325. * Django 2.2 :commit:`(patch) <4036d62bda0e9e9f6172943794b744a454ca49c2>`
  326. February 19, 2021 - :cve:`2021-23336`
  327. -------------------------------------
  328. Web cache poisoning via ``django.utils.http.limited_parse_qsl()``. `Full
  329. description
  330. <https://www.djangoproject.com/weblog/2021/feb/19/security-releases/>`__
  331. Versions affected
  332. ~~~~~~~~~~~~~~~~~
  333. * Django 3.2 :commit:`(patch) <be8237c7cce24b06aabde0b97afce98ddabbe3b6>`
  334. * Django 3.1 :commit:`(patch) <8f6d431b08cbb418d9144b976e7b972546607851>`
  335. * Django 3.0 :commit:`(patch) <326a926beef869d3341bc9ef737887f0449b6b71>`
  336. * Django 2.2 :commit:`(patch) <fd6b6afd5959b638c62dbf4839ccff97e7f7dfda>`
  337. February 1, 2021 - :cve:`2021-3281`
  338. -----------------------------------
  339. Potential directory-traversal via ``archive.extract()``. `Full description
  340. <https://www.djangoproject.com/weblog/2021/feb/01/security-releases/>`__
  341. Versions affected
  342. ~~~~~~~~~~~~~~~~~
  343. * Django 3.1 :commit:`(patch) <02e6592835b4559909aa3aaaf67988fef435f624>`
  344. * Django 3.0 :commit:`(patch) <52e409ed17287e9aabda847b6afe58be2fa9f86a>`
  345. * Django 2.2 :commit:`(patch) <21e7622dec1f8612c85c2fc37fe8efbfd3311e37>`
  346. September 1, 2020 - :cve:`2020-24584`
  347. -------------------------------------
  348. Permission escalation in intermediate-level directories of the file system
  349. cache on Python 3.7+. `Full description
  350. <https://www.djangoproject.com/weblog/2020/sep/01/security-releases/>`__
  351. Versions affected
  352. ~~~~~~~~~~~~~~~~~
  353. * Django 3.1 :commit:`(patch) <2b099caa5923afa8cfb5f1e8c0d56b6e0e81915b>`
  354. * Django 3.0 :commit:`(patch) <cdb367c92a0ba72ddc0cbd13ff42b0e6df709554>`
  355. * Django 2.2 :commit:`(patch) <a3aebfdc8153dc230686b6d2454ccd32ed4c9e6f>`
  356. September 1, 2020 - :cve:`2020-24583`
  357. -------------------------------------
  358. Incorrect permissions on intermediate-level directories on Python 3.7+. `Full
  359. description
  360. <https://www.djangoproject.com/weblog/2020/sep/01/security-releases/>`__
  361. Versions affected
  362. ~~~~~~~~~~~~~~~~~
  363. * Django 3.1 :commit:`(patch) <934430d22aa5d90c2ba33495ff69a6a1d997d584>`
  364. * Django 3.0 :commit:`(patch) <08892bffd275c79ee1f8f67639eb170aaaf1181e>`
  365. * Django 2.2 :commit:`(patch) <375657a71c889c588f723469bd868bd1d40c369f>`
  366. June 3, 2020 - :cve:`2020-13596`
  367. --------------------------------
  368. Possible XSS via admin ``ForeignKeyRawIdWidget``. `Full description
  369. <https://www.djangoproject.com/weblog/2020/jun/03/security-releases/>`__
  370. Versions affected
  371. ~~~~~~~~~~~~~~~~~
  372. * Django 3.0 :commit:`(patch) <1f2dd37f6fcefdd10ed44cb233b2e62b520afb38>`
  373. * Django 2.2 :commit:`(patch) <6d61860b22875f358fac83d903dc629897934815>`
  374. June 3, 2020 - :cve:`2020-13254`
  375. --------------------------------
  376. Potential data leakage via malformed memcached keys. `Full description
  377. <https://www.djangoproject.com/weblog/2020/jun/03/security-releases/>`__
  378. Versions affected
  379. ~~~~~~~~~~~~~~~~~
  380. * Django 3.0 :commit:`(patch) <84b2da5552e100ae3294f564f6c862fef8d0e693>`
  381. * Django 2.2 :commit:`(patch) <07e59caa02831c4569bbebb9eb773bdd9cb4b206>`
  382. March 4, 2020 - :cve:`2020-9402`
  383. --------------------------------
  384. Potential SQL injection via ``tolerance`` parameter in GIS functions and
  385. aggregates on Oracle. `Full description
  386. <https://www.djangoproject.com/weblog/2020/mar/04/security-releases/>`__
  387. Versions affected
  388. ~~~~~~~~~~~~~~~~~
  389. * Django 3.0 :commit:`(patch) <26a5cf834526e291db00385dd33d319b8271fc4c>`
  390. * Django 2.2 :commit:`(patch) <fe886a3b58a93cfbe8864b485f93cb6d426cd1f2>`
  391. * Django 1.11 :commit:`(patch) <02d97f3c9a88adc890047996e5606180bd1c6166>`
  392. February 3, 2020 - :cve:`2020-7471`
  393. -----------------------------------
  394. Potential SQL injection via ``StringAgg(delimiter)``. `Full description
  395. <https://www.djangoproject.com/weblog/2020/feb/03/security-releases/>`__
  396. Versions affected
  397. ~~~~~~~~~~~~~~~~~
  398. * Django 3.0 :commit:`(patch) <505826b469b16ab36693360da9e11fd13213421b>`
  399. * Django 2.2 :commit:`(patch) <c67a368c16e4680b324b4f385398d638db4d8147>`
  400. * Django 1.11 :commit:`(patch) <001b0634cd309e372edb6d7d95d083d02b8e37bd>`
  401. December 18, 2019 - :cve:`2019-19844`
  402. -------------------------------------
  403. Potential account hijack via password reset form. `Full description
  404. <https://www.djangoproject.com/weblog/2019/dec/18/security-releases/>`__
  405. Versions affected
  406. ~~~~~~~~~~~~~~~~~
  407. * Django 3.0 :commit:`(patch) <302a4ff1e8b1c798aab97673909c7a3dfda42c26>`
  408. * Django 2.2 :commit:`(patch) <4d334bea06cac63dc1272abcec545b85136cca0e>`
  409. * Django 1.11 :commit:`(patch) <f4cff43bf921fcea6a29b726eb66767f67753fa2>`
  410. December 2, 2019 - :cve:`2019-19118`
  411. ------------------------------------
  412. Privilege escalation in the Django admin. `Full description
  413. <https://www.djangoproject.com/weblog/2019/dec/02/security-releases/>`__
  414. Versions affected
  415. ~~~~~~~~~~~~~~~~~
  416. * Django 3.0 :commit:`(patch) <092cd66cf3c3e175acce698d6ca2012068d878fa>`
  417. * Django 2.2 :commit:`(patch) <36f580a17f0b3cb087deadf3b65eea024f479c21>`
  418. * Django 2.1 :commit:`(patch) <103ebe2b5ff1b2614b85a52c239f471904d26244>`
  419. August 1, 2019 - :cve:`2019-14235`
  420. ----------------------------------
  421. Potential memory exhaustion in ``django.utils.encoding.uri_to_iri()``. `Full
  422. description
  423. <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  424. Versions affected
  425. ~~~~~~~~~~~~~~~~~
  426. * Django 2.2 :commit:`(patch) <cf694e6852b0da7799f8b53f1fb2f7d20cf17534>`
  427. * Django 2.1 :commit:`(patch) <5d50a2e5fa36ad23ab532fc54cf4073de84b3306>`
  428. * Django 1.11 :commit:`(patch) <869b34e9b3be3a4cfcb3a145f218ffd3f5e3fd79>`
  429. August 1, 2019 - :cve:`2019-14234`
  430. ----------------------------------
  431. SQL injection possibility in key and index lookups for
  432. ``JSONField``/``HStoreField``. `Full description
  433. <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  434. Versions affected
  435. ~~~~~~~~~~~~~~~~~
  436. * Django 2.2 :commit:`(patch) <4f5b58f5cd3c57fee9972ab074f8dc6895d8f387>`
  437. * Django 2.1 :commit:`(patch) <f74b3ae3628c26e1b4f8db3d13a91d52a833a975>`
  438. * Django 1.11 :commit:`(patch) <ed682a24fca774818542757651bfba576c3fc3ef>`
  439. August 1, 2019 - :cve:`2019-14233`
  440. ----------------------------------
  441. Denial-of-service possibility in ``strip_tags()``. `Full description
  442. <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  443. Versions affected
  444. ~~~~~~~~~~~~~~~~~
  445. * Django 2.2 :commit:`(patch) <e34f3c0e9ee5fc9022428fe91640638bafd4cda7>`
  446. * Django 2.1 :commit:`(patch) <5ff8e791148bd451180124d76a55cb2b2b9556eb>`
  447. * Django 1.11 :commit:`(patch) <52479acce792ad80bb0f915f20b835f919993c72>`
  448. August 1, 2019 - :cve:`2019-14232`
  449. ----------------------------------
  450. Denial-of-service possibility in ``django.utils.text.Truncator``. `Full
  451. description <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  452. Versions affected
  453. ~~~~~~~~~~~~~~~~~
  454. * Django 2.2 :commit:`(patch) <c3289717c6f21a8cf23daff1c78c0c014b94041f>`
  455. * Django 2.1 :commit:`(patch) <c23723a1551340cc7d3126f04fcfd178fa224193>`
  456. * Django 1.11 :commit:`(patch) <42a66e969023c00536256469f0e8b8a099ef109d>`
  457. July 1, 2019 - :cve:`2019-12781`
  458. --------------------------------
  459. Incorrect HTTP detection with reverse-proxy connecting via HTTPS. `Full
  460. description <https://www.djangoproject.com/weblog/2019/jul/01/security-releases/>`__
  461. Versions affected
  462. ~~~~~~~~~~~~~~~~~
  463. * Django 2.2 :commit:`(patch) <77706a3e4766da5d5fb75c4db22a0a59a28e6cd6>`
  464. * Django 2.1 :commit:`(patch) <1e40f427bb8d0fb37cc9f830096a97c36c97af6f>`
  465. * Django 1.11 :commit:`(patch) <32124fc41e75074141b05f10fc55a4f01ff7f050>`
  466. June 3, 2019 - :cve:`2019-12308`
  467. --------------------------------
  468. XSS via "Current URL" link generated by ``AdminURLFieldWidget``. `Full
  469. description <https://www.djangoproject.com/weblog/2019/jun/03/security-releases/>`__
  470. Versions affected
  471. ~~~~~~~~~~~~~~~~~
  472. * Django 2.2 :commit:`(patch) <afddabf8428ddc89a332f7a78d0d21eaf2b5a673>`
  473. * Django 2.1 :commit:`(patch) <09186a13d975de6d049f8b3e05484f66b01ece62>`
  474. * Django 1.11 :commit:`(patch) <c238701859a52d584f349cce15d56c8e8137c52b>`
  475. June 3, 2019 - :cve:`2019-11358`
  476. --------------------------------
  477. Prototype pollution in bundled jQuery. `Full description
  478. <https://www.djangoproject.com/weblog/2019/jun/03/security-releases/>`__
  479. Versions affected
  480. ~~~~~~~~~~~~~~~~~
  481. * Django 2.2 :commit:`(patch) <baaf187a4e354bf3976c51e2c83a0d2f8ee6e6ad>`
  482. * Django 2.1 :commit:`(patch) <95649bc08547a878cebfa1d019edec8cb1b80829>`
  483. February 11, 2019 - :cve:`2019-6975`
  484. ------------------------------------
  485. Memory exhaustion in ``django.utils.numberformat.format()``. `Full description
  486. <https://www.djangoproject.com/weblog/2019/feb/11/security-releases/>`__
  487. Versions affected
  488. ~~~~~~~~~~~~~~~~~
  489. * Django 2.1 :commit:`(patch) <40cd19055773705301c3428ed5e08a036d2091f3>`
  490. * Django 2.0 :commit:`(patch <1f42f82566c9d2d73aff1c42790d6b1b243f7676>` and
  491. :commit:`correction) <392e040647403fc8007708d52ce01d915b014849>`
  492. * Django 1.11 :commit:`(patch) <0bbb560183fabf0533289700845dafa94951f227>`
  493. January 4, 2019 - :cve:`2019-3498`
  494. ----------------------------------
  495. Content spoofing possibility in the default 404 page. `Full description
  496. <https://www.djangoproject.com/weblog/2019/jan/04/security-releases/>`__
  497. Versions affected
  498. ~~~~~~~~~~~~~~~~~
  499. * Django 2.1 :commit:`(patch) <64d2396e83aedba3fcc84ca40f23fbd22f0b9b5b>`
  500. * Django 2.0 :commit:`(patch) <9f4ed7c94c62e21644ef5115e393ac426b886f2e>`
  501. * Django 1.11 :commit:`(patch) <1cd00fcf52d089ef0fe03beabd05d59df8ea052a>`
  502. October 1, 2018 - :cve:`2018-16984`
  503. -----------------------------------
  504. Password hash disclosure to "view only" admin users. `Full description
  505. <https://www.djangoproject.com/weblog/2018/oct/01/security-release/>`__
  506. Versions affected
  507. ~~~~~~~~~~~~~~~~~
  508. * Django 2.1 :commit:`(patch) <c4bd5b597e0aa2432e4c867b86650f18af117851>`
  509. August 1, 2018 - :cve:`2018-14574`
  510. ----------------------------------
  511. Open redirect possibility in ``CommonMiddleware``. `Full description
  512. <https://www.djangoproject.com/weblog/2018/aug/01/security-releases/>`__
  513. Versions affected
  514. ~~~~~~~~~~~~~~~~~
  515. * Django 2.1 :commit:`(patch) <c4e5ff7fdb5fce447675e90291fd33fddd052b3c>`
  516. * Django 2.0 :commit:`(patch) <6fffc3c6d420e44f4029d5643f38d00a39b08525>`
  517. * Django 1.11 :commit:`(patch) <d6eaee092709aad477a9894598496c6deec532ff>`
  518. March 6, 2018 - :cve:`2018-7537`
  519. --------------------------------
  520. Denial-of-service possibility in ``truncatechars_html`` and
  521. ``truncatewords_html`` template filters. `Full description
  522. <https://www.djangoproject.com/weblog/2018/mar/06/security-releases/>`__
  523. Versions affected
  524. ~~~~~~~~~~~~~~~~~
  525. * Django 2.0 :commit:`(patch) <94c5da1d17a6b0d378866c66b605102c19f7988c>`
  526. * Django 1.11 :commit:`(patch) <a91436360b79a6ff995c3e5018bcc666dfaf1539>`
  527. * Django 1.8 :commit:`(patch) <d17974a287a6ea2e361daff88fcc004cbd6835fa>`
  528. March 6, 2018 - :cve:`2018-7536`
  529. --------------------------------
  530. Denial-of-service possibility in ``urlize`` and ``urlizetrunc`` template
  531. filters. `Full description
  532. <https://www.djangoproject.com/weblog/2018/mar/06/security-releases/>`__
  533. Versions affected
  534. ~~~~~~~~~~~~~~~~~
  535. * Django 2.0 :commit:`(patch) <e157315da3ae7005fa0683ffc9751dbeca7306c8>`
  536. * Django 1.11 :commit:`(patch) <abf89d729f210c692a50e0ad3f75fb6bec6fae16>`
  537. * Django 1.8 :commit:`(patch) <1ca63a66ef3163149ad822701273e8a1844192c2>`
  538. February 1, 2018 - :cve:`2018-6188`
  539. -----------------------------------
  540. Information leakage in ``AuthenticationForm``. `Full description
  541. <https://www.djangoproject.com/weblog/2018/feb/01/security-releases/>`__
  542. Versions affected
  543. ~~~~~~~~~~~~~~~~~
  544. * Django 2.0 :commit:`(patch) <c37bb28677295f6edda61d8ac461014ef0d3aeb2>`
  545. * Django 1.11 :commit:`(patch) <57b95fedad5e0b83fc9c81466b7d1751c6427aae>`
  546. September 5, 2017 - :cve:`2017-12794`
  547. -------------------------------------
  548. Possible XSS in traceback section of technical 500 debug page. `Full
  549. description <https://www.djangoproject.com/weblog/2017/sep/05/security-releases/>`__
  550. Versions affected
  551. ~~~~~~~~~~~~~~~~~
  552. * Django 1.11 :commit:`(patch) <e35a0c56086924f331e9422daa266e907a4784cc>`
  553. * Django 1.10 :commit:`(patch) <58e08e80e362db79eb0fd775dc81faad90dca47a>`
  554. April 4, 2017 - :cve:`2017-7234`
  555. --------------------------------
  556. Open redirect vulnerability in ``django.views.static.serve()``. `Full
  557. description <https://www.djangoproject.com/weblog/2017/apr/04/security-releases/>`__
  558. Versions affected
  559. ~~~~~~~~~~~~~~~~~
  560. * Django 1.10 :commit:`(patch) <2a9f6ef71b8e23fd267ee2be1be26dde8ab67037>`
  561. * Django 1.9 :commit:`(patch) <5f1ffb07afc1e59729ce2b283124116d6c0659e4>`
  562. * Django 1.8 :commit:`(patch) <4a6b945dffe8d10e7cec107d93e6efaebfbded29>`
  563. April 4, 2017 - :cve:`2017-7233`
  564. --------------------------------
  565. Open redirect and possible XSS attack via user-supplied numeric redirect URLs.
  566. `Full description <https://www.djangoproject.com/weblog/2017/apr/04/security-releases/>`__
  567. Versions affected
  568. ~~~~~~~~~~~~~~~~~
  569. * Django 1.10 :commit:`(patch) <f824655bc2c50b19d2f202d7640785caabc82787>`
  570. * Django 1.9 :commit:`(patch) <254326cb3682389f55f886804d2c43f7b9f23e4f>`
  571. * Django 1.8 :commit:`(patch) <8339277518c7d8ec280070a780915304654e3b66>`
  572. November 1, 2016 - :cve:`2016-9014`
  573. -----------------------------------
  574. DNS rebinding vulnerability when ``DEBUG=True``. `Full description
  575. <https://www.djangoproject.com/weblog/2016/nov/01/security-releases/>`__
  576. Versions affected
  577. ~~~~~~~~~~~~~~~~~
  578. * Django 1.10 :commit:`(patch) <884e113838e5a72b4b0ec9e5e87aa480f6aa4472>`
  579. * Django 1.9 :commit:`(patch) <45acd6d836895a4c36575f48b3fb36a3dae98d19>`
  580. * Django 1.8 :commit:`(patch) <c401ae9a7dfb1a94a8a61927ed541d6f93089587>`
  581. November 1, 2016 - :cve:`2016-9013`
  582. -----------------------------------
  583. User with hardcoded password created when running tests on Oracle. `Full
  584. description <https://www.djangoproject.com/weblog/2016/nov/01/security-releases/>`__
  585. Versions affected
  586. ~~~~~~~~~~~~~~~~~
  587. * Django 1.10 :commit:`(patch) <34e10720d81b8d407aa14d763b6a7fe8f13b4f2e>`
  588. * Django 1.9 :commit:`(patch) <4844d86c7728c1a5a3bbce4ad336a8d32304072b>`
  589. * Django 1.8 :commit:`(patch) <70f99952965a430daf69eeb9947079aae535d2d0>`
  590. September 26, 2016 - :cve:`2016-7401`
  591. -------------------------------------
  592. CSRF protection bypass on a site with Google Analytics. `Full description
  593. <https://www.djangoproject.com/weblog/2016/sep/26/security-releases/>`__
  594. Versions affected
  595. ~~~~~~~~~~~~~~~~~
  596. * Django 1.9 :commit:`(patch) <d1bc980db1c0fffd6d60677e62f70beadb9fe64a>`
  597. * Django 1.8 :commit:`(patch) <6118ab7d0676f0d622278e5be215f14fb5410b6a>`
  598. July 18, 2016 - :cve:`2016-6186`
  599. --------------------------------
  600. XSS in admin's add/change related popup. `Full description
  601. <https://www.djangoproject.com/weblog/2016/jul/18/security-releases/>`__
  602. Versions affected
  603. ~~~~~~~~~~~~~~~~~
  604. * Django 1.9 :commit:`(patch) <d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158>`
  605. * Django 1.8 :commit:`(patch) <f68e5a99164867ab0e071a936470958ed867479d>`
  606. March 1, 2016 - :cve:`2016-2513`
  607. --------------------------------
  608. User enumeration through timing difference on password hasher work factor
  609. upgrade. `Full description
  610. <https://www.djangoproject.com/weblog/2016/mar/01/security-releases/>`__
  611. Versions affected
  612. ~~~~~~~~~~~~~~~~~
  613. * Django 1.9 :commit:`(patch) <af7d09b0c5c6ab68e629fd9baf736f9dd203b18e>`
  614. * Django 1.8 :commit:`(patch) <f4e6e02f7713a6924d16540be279909ff4091eb6>`
  615. March 1, 2016 - :cve:`2016-2512`
  616. --------------------------------
  617. Malicious redirect and possible XSS attack via user-supplied redirect URLs
  618. containing basic auth. `Full description
  619. <https://www.djangoproject.com/weblog/2016/mar/01/security-releases/>`__
  620. Versions affected
  621. ~~~~~~~~~~~~~~~~~
  622. * Django 1.9 :commit:`(patch) <fc6d147a63f89795dbcdecb0559256470fff4380>`
  623. * Django 1.8 :commit:`(patch) <382ab137312961ad62feb8109d70a5a581fe8350>`
  624. February 1, 2016 - :cve:`2016-2048`
  625. -----------------------------------
  626. User with "change" but not "add" permission can create objects for
  627. ``ModelAdmin``’s with ``save_as=True``. `Full description
  628. <https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/>`__
  629. Versions affected
  630. ~~~~~~~~~~~~~~~~~
  631. * Django 1.9 :commit:`(patch) <adbca5e4db42542575734b8e5d26961c8ada7265>`
  632. November 24, 2015 - :cve:`2015-8213`
  633. ------------------------------------
  634. Settings leak possibility in ``date`` template filter. `Full description
  635. <https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/>`__
  636. Versions affected
  637. ~~~~~~~~~~~~~~~~~
  638. * Django 1.8 :commit:`(patch) <9f83fc2f66f5a0bac7c291aec55df66050bb6991>`
  639. * Django 1.7 :commit:`(patch) <8a01c6b53169ee079cb21ac5919fdafcc8c5e172>`
  640. August 18, 2015 - :cve:`2015-5963` / :cve:`2015-5964`
  641. -----------------------------------------------------
  642. Denial-of-service possibility in ``logout()`` view by filling session store.
  643. `Full description <https://www.djangoproject.com/weblog/2015/aug/18/security-releases/>`__
  644. Versions affected
  645. ~~~~~~~~~~~~~~~~~
  646. * Django 1.8 :commit:`(patch) <2eb86b01d7b59be06076f6179a454d0fd0afaff6>`
  647. * Django 1.7 :commit:`(patch) <2f5485346ee6f84b4e52068c04e043092daf55f7>`
  648. * Django 1.4 :commit:`(patch) <575f59f9bc7c59a5e41a081d1f5f55fc859c5012>`
  649. July 8, 2015 - :cve:`2015-5145`
  650. -------------------------------
  651. Denial-of-service possibility in URL validation. `Full description
  652. <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  653. Versions affected
  654. ~~~~~~~~~~~~~~~~~
  655. * Django 1.8 :commit:`(patch) <8f9a4d3a2bc42f14bb437defd30c7315adbff22c>`
  656. July 8, 2015 - :cve:`2015-5144`
  657. -------------------------------
  658. Header injection possibility since validators accept newlines in input. `Full
  659. description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  660. Versions affected
  661. ~~~~~~~~~~~~~~~~~
  662. * Django 1.8 :commit:`(patch) <574dd5e0b0fbb877ae5827b1603d298edc9bb2a0>`
  663. * Django 1.7 :commit:`(patch) <ae49b4d994656bc037513dcd064cb9ce5bb85649>`
  664. * Django 1.4 :commit:`(patch) <1ba1cdce7d58e6740fe51955d945b56ae51d072a>`
  665. July 8, 2015 - :cve:`2015-5143`
  666. -------------------------------
  667. Denial-of-service possibility by filling session store. `Full
  668. description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  669. Versions affected
  670. ~~~~~~~~~~~~~~~~~
  671. * Django 1.8 :commit:`(patch) <66d12d1ababa8f062857ee5eb43276493720bf16>`
  672. * Django 1.7 :commit:`(patch) <1828f4341ec53a8684112d24031b767eba557663>`
  673. * Django 1.4 :commit:`(patch) <2e47f3e401c29bc2ba5ab794d483cb0820855fb9>`
  674. May 20, 2015 - :cve:`2015-3982`
  675. -------------------------------
  676. Fixed session flushing in the cached_db backend. `Full description
  677. <https://www.djangoproject.com/weblog/2015/may/20/security-release/>`__
  678. Versions affected
  679. ~~~~~~~~~~~~~~~~~
  680. * Django 1.8 :commit:`(patch) <31cb25adecba930bdeee4556709f5a1c42d88fd6>`
  681. March 18, 2015 - :cve:`2015-2317`
  682. ---------------------------------
  683. Mitigated possible XSS attack via user-supplied redirect URLs. `Full
  684. description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
  685. Versions affected
  686. ~~~~~~~~~~~~~~~~~
  687. * Django 1.4 :commit:`(patch) <2342693b31f740a422abf7267c53b4e7bc487c1b>`
  688. * Django 1.6 :commit:`(patch) <5510f070711540aaa8d3707776cd77494e688ef9>`
  689. * Django 1.7 :commit:`(patch) <2a4113dbd532ce952308992633d802dc169a75f1>`
  690. * Django 1.8 :commit:`(patch) <770427c2896a078925abfca2317486b284d22f04>`
  691. March 18, 2015 - :cve:`2015-2316`
  692. ---------------------------------
  693. Denial-of-service possibility with ``strip_tags()``. `Full description
  694. <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
  695. Versions affected
  696. ~~~~~~~~~~~~~~~~~
  697. * Django 1.6 :commit:`(patch) <b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f>`
  698. * Django 1.7 :commit:`(patch) <e63363f8e075fa8d66326ad6a1cc3391cc95cd97>`
  699. * Django 1.8 :commit:`(patch) <5447709a571cd5d95971f1d5d21d4a7edcf85bbd>`
  700. March 9, 2015 - :cve:`2015-2241`
  701. --------------------------------
  702. XSS attack via properties in ``ModelAdmin.readonly_fields``. `Full description
  703. <https://www.djangoproject.com/weblog/2015/mar/09/security-releases/>`__
  704. Versions affected
  705. ~~~~~~~~~~~~~~~~~
  706. * Django 1.7 :commit:`(patch) <d16e4e1d6f95e6f46bff53cc4fd0ab398b8e5059>`
  707. * Django 1.8 :commit:`(patch) <2654e1b93923bac55f12b4e66c5e39b16695ace5>`
  708. January 13, 2015 - :cve:`2015-0222`
  709. -----------------------------------
  710. Database denial-of-service with ``ModelMultipleChoiceField``. `Full description
  711. <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  712. Versions affected
  713. ~~~~~~~~~~~~~~~~~
  714. * Django 1.6 :commit:`(patch) <d7a06ee7e571b6dad07c0f5b519b1db02e2a476c>`
  715. * Django 1.7 :commit:`(patch) <bcfb47780ce7caecb409a9e9c1c314266e41d392>`
  716. January 13, 2015 - :cve:`2015-0221`
  717. -----------------------------------
  718. Denial-of-service attack against ``django.views.static.serve()``. `Full
  719. description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  720. Versions affected
  721. ~~~~~~~~~~~~~~~~~
  722. * Django 1.4 :commit:`(patch) <d020da6646c5142bc092247d218a3d1ce3e993f7>`
  723. * Django 1.6 :commit:`(patch) <553779c4055e8742cc832ed525b9ee34b174934f>`
  724. * Django 1.7 :commit:`(patch) <818e59a3f0fbadf6c447754d202d88df025f8f2a>`
  725. January 13, 2015 - :cve:`2015-0220`
  726. -----------------------------------
  727. Mitigated possible XSS attack via user-supplied redirect URLs. `Full
  728. description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  729. Versions affected
  730. ~~~~~~~~~~~~~~~~~
  731. * Django 1.4 :commit:`(patch) <4c241f1b710da6419d9dca160e80b23b82db7758>`
  732. * Django 1.6 :commit:`(patch) <72e0b033662faa11bb7f516f18a132728aa0ae28>`
  733. * Django 1.7 :commit:`(patch) <de67dedc771ad2edec15c1d00c083a1a084e1e89>`
  734. January 13, 2015 - :cve:`2015-0219`
  735. -----------------------------------
  736. WSGI header spoofing via underscore/dash conflation. `Full description
  737. <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  738. Versions affected
  739. ~~~~~~~~~~~~~~~~~
  740. * Django 1.4 :commit:`(patch) <4f6fffc1dc429f1ad428ecf8e6620739e8837450>`
  741. * Django 1.6 :commit:`(patch) <d7597b31d5c03106eeba4be14a33b32a5e25f4ee>`
  742. * Django 1.7 :commit:`(patch) <41b4bc73ee0da7b2e09f4af47fc1fd21144c710f>`
  743. August 20, 2014 - :cve:`2014-0483`
  744. ----------------------------------
  745. Data leakage via querystring manipulation in admin.
  746. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  747. Versions affected
  748. ~~~~~~~~~~~~~~~~~
  749. * Django 1.4 :commit:`(patch) <027bd348642007617518379f8b02546abacaa6e0>`
  750. * Django 1.5 :commit:`(patch) <2a446c896e7c814661fb9c4f212b071b2a7fa446>`
  751. * Django 1.6 :commit:`(patch) <f7c494f2506250b8cb5923714360a3642ed63e0f>`
  752. * Django 1.7 :commit:`(patch) <2b31342cdf14fc20e07c43d258f1e7334ad664a6>`
  753. August 20, 2014 - :cve:`2014-0482`
  754. ----------------------------------
  755. ``RemoteUserMiddleware`` session hijacking. `Full description
  756. <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  757. Versions affected
  758. ~~~~~~~~~~~~~~~~~
  759. * Django 1.4 :commit:`(patch) <c9e3b9949cd55f090591fbdc4a114fcb8368b6d9>`
  760. * Django 1.5 :commit:`(patch) <dd68f319b365f6cb38c5a6c106faf4f6142d7d88>`
  761. * Django 1.6 :commit:`(patch) <0268b855f9eab3377f2821164ef3e66037789e09>`
  762. * Django 1.7 :commit:`(patch) <1a45d059c70385fcd6f4a3955f3b4e4cc96d0150>`
  763. August 20, 2014 - :cve:`2014-0481`
  764. ----------------------------------
  765. File upload denial of service. `Full description
  766. <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  767. Versions affected
  768. ~~~~~~~~~~~~~~~~~
  769. * Django 1.4 :commit:`(patch) <30042d475bf084c6723c6217a21598d9247a9c41>`
  770. * Django 1.5 :commit:`(patch) <26cd48e166ac4d84317c8ee6d63ac52a87e8da99>`
  771. * Django 1.6 :commit:`(patch) <dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1>`
  772. * Django 1.7 :commit:`(patch) <3123f8452cf49071be9110e277eea60ba0032216>`
  773. August 20, 2014 - :cve:`2014-0480`
  774. ----------------------------------
  775. ``reverse()`` can generate URLs pointing to other hosts. `Full description
  776. <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  777. Versions affected
  778. ~~~~~~~~~~~~~~~~~
  779. * Django 1.4 :commit:`(patch) <c2fe73133b62a1d9e8f7a6b43966570b14618d7e>`
  780. * Django 1.5 :commit:`(patch) <45ac9d4fb087d21902469fc22643f5201d41a0cd>`
  781. * Django 1.6 :commit:`(patch) <da051da8df5e69944745072611351d4cfc6435d5>`
  782. * Django 1.7 :commit:`(patch) <bf650a2ee78c6d1f4544a875dcc777cf27fe93e9>`
  783. May 18, 2014 - :cve:`2014-3730`
  784. -------------------------------
  785. Malformed URLs from user input incorrectly validated. `Full description
  786. <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
  787. Versions affected
  788. ~~~~~~~~~~~~~~~~~
  789. * Django 1.4 :commit:`(patch) <7feb54bbae3f637ab3c4dd4831d4385964f574df>`
  790. * Django 1.5 :commit:`(patch) <ad32c218850ad40972dcef57beb460f8c979dd6d>`
  791. * Django 1.6 :commit:`(patch) <601107524523bca02376a0ddc1a06c6fdb8f22f3>`
  792. * Django 1.7 :commit:`(patch) <e7b0cace455c2da24492660636bfd48c45a19cdf>`
  793. May 18, 2014 - :cve:`2014-1418`
  794. -------------------------------
  795. Caches may be allowed to store and serve private data. `Full description
  796. <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
  797. Versions affected
  798. ~~~~~~~~~~~~~~~~~
  799. * Django 1.4 :commit:`(patch) <28e23306aa53bbbb8fb87db85f99d970b051026c>`
  800. * Django 1.5 :commit:`(patch) <4001ec8698f577b973c5a540801d8a0bbea1205b>`
  801. * Django 1.6 :commit:`(patch) <1abcf3a808b35abae5d425ed4d44cb6e886dc769>`
  802. * Django 1.7 :commit:`(patch) <7fef18ba9e5a8b47bc24b5bb259c8bf3d3879f2a>`
  803. April 21, 2014 - :cve:`2014-0474`
  804. ---------------------------------
  805. MySQL typecasting causes unexpected query results. `Full description
  806. <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  807. Versions affected
  808. ~~~~~~~~~~~~~~~~~
  809. * Django 1.4 :commit:`(patch) <aa80f498de6d687e613860933ac58433ab71ea4b>`
  810. * Django 1.5 :commit:`(patch) <985434fb1d6bf2335bf96c6ebf91c3674f1f399f>`
  811. * Django 1.6 :commit:`(patch) <5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292>`
  812. * Django 1.7 :commit:`(patch) <34526c2f56b863c2103655a0893ac801667e86ea>`
  813. April 21, 2014 - :cve:`2014-0473`
  814. ---------------------------------
  815. Caching of anonymous pages could reveal CSRF token. `Full description
  816. <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  817. Versions affected
  818. ~~~~~~~~~~~~~~~~~
  819. * Django 1.4 :commit:`(patch) <1170f285ddd6a94a65f911a27788ba49ca08c0b0>`
  820. * Django 1.5 :commit:`(patch) <6872f42757d7ef6a97e0b6ec5db4d2615d8a2bd8>`
  821. * Django 1.6 :commit:`(patch) <d63e20942f3024f24cb8cd85a49461ba8a9b6736>`
  822. * Django 1.7 :commit:`(patch) <380545bf85cbf17fc698d136815b7691f8d023ca>`
  823. April 21, 2014 - :cve:`2014-0472`
  824. ---------------------------------
  825. Unexpected code execution using ``reverse()``. `Full description
  826. <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  827. Versions affected
  828. ~~~~~~~~~~~~~~~~~
  829. * Django 1.4 :commit:`(patch) <c1a8c420fe4b27fb2caf5e46d23b5712fc0ac535>`
  830. * Django 1.5 :commit:`(patch) <2a5bcb69f42b84464b24b5c835dca6467b6aa7f1>`
  831. * Django 1.6 :commit:`(patch) <4352a50871e239ebcdf64eee6f0b88e714015c1b>`
  832. * Django 1.7 :commit:`(patch) <546740544d7f69254a67b06a3fc7fa0c43512958>`
  833. September 14, 2013 - :cve:`2013-1443`
  834. -------------------------------------
  835. Denial-of-service via large passwords. `Full description
  836. <https://www.djangoproject.com/weblog/2013/sep/15/security/>`__
  837. Versions affected
  838. ~~~~~~~~~~~~~~~~~
  839. * Django 1.4 :commit:`(patch <3f3d887a6844ec2db743fee64c9e53e04d39a368>` and :commit:`Python compatibility fix) <6903d1690a92aa040adfb0c8eb37cf62e4206714>`
  840. * Django 1.5 :commit:`(patch) <22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc>`
  841. September 10, 2013 - :cve:`2013-4315`
  842. -------------------------------------
  843. Directory-traversal via ``ssi`` template tag. `Full description
  844. <https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/>`__
  845. Versions affected
  846. ~~~~~~~~~~~~~~~~~
  847. * Django 1.4 :commit:`(patch) <87d2750b39f6f2d54b7047225521a44dcd37e896>`
  848. * Django 1.5 :commit:`(patch) <988b61c550d798f9a66d17ee0511fb7a9a7f33ca>`
  849. August 13, 2013 - :cve:`2013-6044`
  850. ----------------------------------
  851. Possible XSS via unvalidated URL redirect schemes. `Full description
  852. <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  853. Versions affected
  854. ~~~~~~~~~~~~~~~~~
  855. * Django 1.4 :commit:`(patch) <ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a>`
  856. * Django 1.5 :commit:`(patch) <1a274ccd6bc1afbdac80344c9b6e5810c1162b5f>`
  857. August 13, 2013 - :cve:`2013-4249`
  858. ----------------------------------
  859. XSS via admin trusting ``URLField`` values. `Full description
  860. <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  861. Versions affected
  862. ~~~~~~~~~~~~~~~~~
  863. * Django 1.5 :commit:`(patch) <90363e388c61874add3f3557ee654a996ec75d78>`
  864. February 19, 2013 - :cve:`2013-0306`
  865. ------------------------------------
  866. Denial-of-service via formset ``max_num`` bypass. `Full description
  867. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  868. Versions affected
  869. ~~~~~~~~~~~~~~~~~
  870. * Django 1.3 :commit:`(patch) <d7094bbce8cb838f3b40f504f198c098ff1cf727>`
  871. * Django 1.4 :commit:`(patch) <0cc350a896f70ace18280410eb616a9197d862b0>`
  872. February 19, 2013 - :cve:`2013-0305`
  873. ------------------------------------
  874. Information leakage via admin history log. `Full description
  875. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  876. Versions affected
  877. ~~~~~~~~~~~~~~~~~
  878. * Django 1.3 :commit:`(patch) <d3a45e10c8ac8268899999129daa27652ec0da35>`
  879. * Django 1.4 :commit:`(patch) <0e7861aec73702f7933ce2a93056f7983939f0d6>`
  880. February 19, 2013 - :cve:`2013-1664` / :cve:`2013-1665`
  881. -------------------------------------------------------
  882. Entity-based attacks against Python XML libraries. `Full description
  883. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  884. Versions affected
  885. ~~~~~~~~~~~~~~~~~
  886. * Django 1.3 :commit:`(patch) <d19a27066b2247102e65412aa66917aff0091112>`
  887. * Django 1.4 :commit:`(patch) <1c60d07ba23e0350351c278ad28d0bd5aa410b40>`
  888. February 19, 2013 - No CVE
  889. --------------------------
  890. Additional hardening of ``Host`` header handling. `Full description
  891. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  892. Versions affected
  893. ~~~~~~~~~~~~~~~~~
  894. * Django 1.3 :commit:`(patch) <27cd872e6e36a81d0bb6f5b8765a1705fecfc253>`
  895. * Django 1.4 :commit:`(patch) <9936fdb11d0bbf0bd242f259bfb97bbf849d16f8>`
  896. December 10, 2012 - No CVE 2
  897. ----------------------------
  898. Additional hardening of redirect validation. `Full description
  899. <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  900. Versions affected
  901. ~~~~~~~~~~~~~~~~~
  902. * Django 1.3: :commit:`(patch) <1515eb46daa0897ba5ad5f0a2db8969255f1b343>`
  903. * Django 1.4: :commit:`(patch) <b2ae0a63aeec741f1e51bac9a95a27fd635f9652>`
  904. December 10, 2012 - No CVE 1
  905. ----------------------------
  906. Additional hardening of ``Host`` header handling. `Full description
  907. <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  908. Versions affected
  909. ~~~~~~~~~~~~~~~~~
  910. * Django 1.3 :commit:`(patch) <2da4ace0bc1bc1d79bf43b368cb857f6f0cd6b1b>`
  911. * Django 1.4 :commit:`(patch) <319627c184e71ae267d6b7f000e293168c7b6e09>`
  912. October 17, 2012 - :cve:`2012-4520`
  913. -----------------------------------
  914. ``Host`` header poisoning. `Full description
  915. <https://www.djangoproject.com/weblog/2012/oct/17/security/>`__
  916. Versions affected
  917. ~~~~~~~~~~~~~~~~~
  918. * Django 1.3 :commit:`(patch) <b45c377f8f488955e0c7069cad3f3dd21910b071>`
  919. * Django 1.4 :commit:`(patch) <92d3430f12171f16f566c9050c40feefb830a4a3>`
  920. July 30, 2012 - :cve:`2012-3444`
  921. --------------------------------
  922. Denial-of-service via large image files. `Full description
  923. <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  924. Versions affected
  925. ~~~~~~~~~~~~~~~~~
  926. * Django 1.3 :commit:`(patch) <9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155>`
  927. * Django 1.4 :commit:`(patch) <da33d67181b53fe6cc737ac1220153814a1509f6>`
  928. July 30, 2012 - :cve:`2012-3443`
  929. --------------------------------
  930. Denial-of-service via compressed image files. `Full description
  931. <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  932. Versions affected
  933. ~~~~~~~~~~~~~~~~~
  934. * Django 1.3: :commit:`(patch) <b2eb4787a0fff9c9993b78be5c698e85108f3446>`
  935. * Django 1.4: :commit:`(patch) <c14f325c4eef628bc7bfd8873c3a72aeb0219141>`
  936. July 30, 2012 - :cve:`2012-3442`
  937. --------------------------------
  938. XSS via failure to validate redirect scheme. `Full description
  939. <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  940. Versions affected
  941. ~~~~~~~~~~~~~~~~~
  942. * Django 1.3: :commit:`(patch) <4dea4883e6c50d75f215a6b9bcbd95273f57c72d>`
  943. * Django 1.4: :commit:`(patch) <e34685034b60be1112160e76091e5aee60149fa1>`
  944. September 9, 2011 - :cve:`2011-4140`
  945. ------------------------------------
  946. Potential CSRF via ``Host`` header. `Full description
  947. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  948. Versions affected
  949. ~~~~~~~~~~~~~~~~~
  950. This notification was an advisory only, so no patches were issued.
  951. * Django 1.2
  952. * Django 1.3
  953. September 9, 2011 - :cve:`2011-4139`
  954. ------------------------------------
  955. ``Host`` header cache poisoning. `Full description
  956. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  957. Versions affected
  958. ~~~~~~~~~~~~~~~~~
  959. * Django 1.2 :commit:`(patch) <c613af4d6485586c79d692b70a9acac429f3ca9d>`
  960. * Django 1.3 :commit:`(patch) <2f7fadc38efa58ac0a8f93f936b82332a199f396>`
  961. September 9, 2011 - :cve:`2011-4138`
  962. ------------------------------------
  963. Information leakage/arbitrary request issuance via ``URLField.verify_exists``.
  964. `Full description
  965. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  966. Versions affected
  967. ~~~~~~~~~~~~~~~~~
  968. * Django 1.2: :commit:`(patch) <7268f8af86186518821d775c530d5558fd726930>`
  969. * Django 1.3: :commit:`(patch) <1a76dbefdfc60e2d5954c0ba614c3d054ba9c3f0>`
  970. September 9, 2011 - :cve:`2011-4137`
  971. ------------------------------------
  972. Denial-of-service via ``URLField.verify_exists``. `Full description
  973. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  974. Versions affected
  975. ~~~~~~~~~~~~~~~~~
  976. * Django 1.2 :commit:`(patch) <7268f8af86186518821d775c530d5558fd726930>`
  977. * Django 1.3 :commit:`(patch) <1a76dbefdfc60e2d5954c0ba614c3d054ba9c3f0>`
  978. September 9, 2011 - :cve:`2011-4136`
  979. ------------------------------------
  980. Session manipulation when using memory-cache-backed session. `Full description
  981. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  982. Versions affected
  983. ~~~~~~~~~~~~~~~~~
  984. * Django 1.2 :commit:`(patch) <ac7c3a110f906e4dfed3a17451bf7fd9fcb81296>`
  985. * Django 1.3 :commit:`(patch) <fbe2eead2fa9d808658ca582241bcacb02618840>`
  986. February 8, 2011 - :cve:`2011-0698`
  987. -----------------------------------
  988. Directory-traversal on Windows via incorrect path-separator handling. `Full
  989. description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  990. Versions affected
  991. ~~~~~~~~~~~~~~~~~
  992. * Django 1.1 :commit:`(patch) <570a32a047ea56265646217264b0d3dab1a14dbd>`
  993. * Django 1.2 :commit:`(patch) <194566480b15cf4e294d3f03ff587019b74044b2>`
  994. February 8, 2011 - :cve:`2011-0697`
  995. -----------------------------------
  996. XSS via unsanitized names of uploaded files. `Full description
  997. <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  998. Versions affected
  999. ~~~~~~~~~~~~~~~~~
  1000. * Django 1.1 :commit:`(patch) <1966786d2dde73e17f39cf340eb33fcb5d73904e>`
  1001. * Django 1.2 :commit:`(patch) <1f814a9547842dcfabdae09573055984af9d3fab>`
  1002. February 8, 2011 - :cve:`2011-0696`
  1003. -----------------------------------
  1004. CSRF via forged HTTP headers. `Full description
  1005. <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  1006. Versions affected
  1007. ~~~~~~~~~~~~~~~~~
  1008. * Django 1.1 :commit:`(patch) <408c5c873ce1437c7eee9544ff279ecbad7e150a>`
  1009. * Django 1.2 :commit:`(patch) <818e70344e7193f6ebc73c82ed574e6ce3c91afc>`
  1010. December 22, 2010 - :cve:`2010-4535`
  1011. ------------------------------------
  1012. Denial-of-service in password-reset mechanism. `Full description
  1013. <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  1014. Versions affected
  1015. ~~~~~~~~~~~~~~~~~
  1016. * Django 1.1 :commit:`(patch) <7f8dd9cbac074389af8d8fd235bf2cb657227b9a>`
  1017. * Django 1.2 :commit:`(patch) <d5d8942a160685c403d381a279e72e09de5489a9>`
  1018. December 22, 2010 - :cve:`2010-4534`
  1019. ------------------------------------
  1020. Information leakage in administrative interface. `Full description
  1021. <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  1022. Versions affected
  1023. ~~~~~~~~~~~~~~~~~
  1024. * Django 1.1 :commit:`(patch) <17084839fd7e267da5729f2a27753322b9d415a0>`
  1025. * Django 1.2 :commit:`(patch) <85207a245bf09fdebe486b4c7bbcb65300f2a693>`
  1026. September 8, 2010 - :cve:`2010-3082`
  1027. ------------------------------------
  1028. XSS via trusting unsafe cookie value. `Full description
  1029. <https://www.djangoproject.com/weblog/2010/sep/08/security-release/>`__
  1030. Versions affected
  1031. ~~~~~~~~~~~~~~~~~
  1032. * Django 1.2 :commit:`(patch) <7f84657b6b2243cc787bdb9f296710c8d13ad0bd>`
  1033. October 9, 2009 - :cve:`2009-3965`
  1034. ----------------------------------
  1035. Denial-of-service via pathological regular expression performance. `Full
  1036. description <https://www.djangoproject.com/weblog/2009/oct/09/security/>`__
  1037. Versions affected
  1038. ~~~~~~~~~~~~~~~~~
  1039. * Django 1.0 :commit:`(patch) <594a28a9044120bed58671dde8a805c9e0f6c79a>`
  1040. * Django 1.1 :commit:`(patch) <e3e992e18b368fcd56aabafc1b5bf80a6e11b495>`
  1041. July 28, 2009 - :cve:`2009-2659`
  1042. --------------------------------
  1043. Directory-traversal in development server media handler. `Full description
  1044. <https://www.djangoproject.com/weblog/2009/jul/28/security/>`__
  1045. Versions affected
  1046. ~~~~~~~~~~~~~~~~~
  1047. * Django 0.96 :commit:`(patch) <da85d76fd6ca846f3b0ff414e042ddb5e62e2e69>`
  1048. * Django 1.0 :commit:`(patch) <df7f917b7f51ba969faa49d000ffc79572c5dcb4>`
  1049. September 2, 2008 - :cve:`2008-3909`
  1050. ------------------------------------
  1051. CSRF via preservation of POST data during admin login. `Full description
  1052. <https://www.djangoproject.com/weblog/2008/sep/02/security/>`__
  1053. Versions affected
  1054. ~~~~~~~~~~~~~~~~~
  1055. * Django 0.91 :commit:`(patch) <44debfeaa4473bd28872c735dd3d9afde6886752>`
  1056. * Django 0.95 :commit:`(patch) <aee48854a164382c655acb9f18b3c06c3d238e81>`
  1057. * Django 0.96 :commit:`(patch) <7e0972bded362bc4b851c109df2c8a6548481a8e>`
  1058. May 14, 2008 - :cve:`2008-2302`
  1059. -------------------------------
  1060. XSS via admin login redirect. `Full description
  1061. <https://www.djangoproject.com/weblog/2008/may/14/security/>`__
  1062. Versions affected
  1063. ~~~~~~~~~~~~~~~~~
  1064. * Django 0.91 :commit:`(patch) <6e657e2c404a96e744748209e896d8a69c15fdf2>`
  1065. * Django 0.95 :commit:`(patch) <50ce7fb57d79e8940ccf6e2781f2f01df029b5c5>`
  1066. * Django 0.96 :commit:`(patch) <7791e5c050cebf86d868c5dab7092185b125fdc9>`
  1067. October 26, 2007 - :cve:`2007-5712`
  1068. -----------------------------------
  1069. Denial-of-service via arbitrarily-large ``Accept-Language`` header. `Full
  1070. description <https://www.djangoproject.com/weblog/2007/oct/26/security-fix/>`__
  1071. Versions affected
  1072. ~~~~~~~~~~~~~~~~~
  1073. * Django 0.91 :commit:`(patch) <8bc36e726c9e8c75c681d3ad232df8e882aaac81>`
  1074. * Django 0.95 :commit:`(patch) <412ed22502e11c50dbfee854627594f0e7e2c234>`
  1075. * Django 0.96 :commit:`(patch) <7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f>`
  1076. Issues prior to Django's security process
  1077. =========================================
  1078. Some security issues were handled before Django had a formalized
  1079. security process in use. For these, new releases may not have been
  1080. issued at the time and CVEs may not have been assigned.
  1081. January 21, 2007 - :cve:`2007-0405`
  1082. -----------------------------------
  1083. Apparent "caching" of authenticated user. `Full description
  1084. <https://www.djangoproject.com/weblog/2007/jan/21/0951/>`__
  1085. Versions affected
  1086. ~~~~~~~~~~~~~~~~~
  1087. * Django 0.95 :commit:`(patch) <e89f0a65581f82a5740bfe989136cea75d09cd67>`
  1088. August 16, 2006 - :cve:`2007-0404`
  1089. ----------------------------------
  1090. Filename validation issue in translation framework. `Full description
  1091. <https://www.djangoproject.com/weblog/2006/aug/16/compilemessages/>`__
  1092. Versions affected
  1093. ~~~~~~~~~~~~~~~~~
  1094. * Django 0.90 :commit:`(patch) <6eefa521be3c658dc0b38f8d62d52e9801e198ab>`
  1095. * Django 0.91 :commit:`(patch) <d31e39173c29537e6a1613278c93634c18a3206e>`
  1096. * Django 0.95 :commit:`(patch) <a132d411c6986418ee6c0edc331080aa792fee6e>`
  1097. (released January 21 2007)