security.txt 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501
  1. .. _security-releases:
  2. ==========================
  3. Archive of security issues
  4. ==========================
  5. Django's development team is strongly committed to responsible
  6. reporting and disclosure of security-related issues, as outlined in
  7. :doc:`Django's security policies </internals/security>`.
  8. As part of that commitment, we maintain the following historical list
  9. of issues which have been fixed and disclosed. For each issue, the
  10. list below includes the date, a brief description, the `CVE identifier
  11. <http://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures>`_
  12. if applicable, a list of affected versions, a link to the full
  13. disclosure and links to the appropriate patch(es).
  14. Some important caveats apply to this information:
  15. * Lists of affected versions include only those versions of Django
  16. which had stable, security-supported releases at the time of
  17. disclosure. This means older versions (whose security support had
  18. expired) and versions which were in pre-release (alpha/beta/RC)
  19. states at the time of disclosure may have been affected, but are not
  20. listed.
  21. * The Django project has on occasion issued security advisories,
  22. pointing out potential security problems which can arise from
  23. improper configuration or from other issues outside of Django
  24. itself. Some of these advisories have received CVEs; when that is
  25. the case, they are listed here, but as they have no accompanying
  26. patches or releases, only the description, disclosure and CVE will
  27. be listed.
  28. Issues prior to Django's security process
  29. =========================================
  30. Some security issues were handled before Django had a formalized
  31. security process in use. For these, new releases may not have been
  32. issued at the time and CVEs may not have been assigned.
  33. August 16, 2006 - CVE-2007-0404
  34. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  35. `CVE-2007-0404 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0404&cid=3>`_: Filename validation issue in translation framework. `Full description <https://www.djangoproject.com/weblog/2006/aug/16/compilemessages/>`__
  36. Versions affected
  37. -----------------
  38. * Django 0.90 `(patch) <https://github.com/django/django/commit/518d406e53>`__
  39. * Django 0.91 `(patch) <https://github.com/django/django/commit/518d406e53>`__
  40. * Django 0.95 `(patch) <https://github.com/django/django/commit/a132d411c6>`__ (released January 21 2007)
  41. January 21, 2007 - CVE-2007-0405
  42. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  43. `CVE-2007-0405 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0405&cid=3>`_: Apparent "caching" of authenticated user. `Full description <https://www.djangoproject.com/weblog/2007/jan/21/0951/>`__
  44. Versions affected
  45. -----------------
  46. * Django 0.95 `(patch) <https://github.com/django/django/commit/e89f0a6558>`__
  47. Issues under Django's security process
  48. ======================================
  49. All other security issues have been handled under versions of Django's
  50. security process. These are listed below.
  51. October 26, 2007 - CVE-2007-5712
  52. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  53. `CVE-2007-5712 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5712&cid=3>`_: Denial-of-service via arbitrarily-large ``Accept-Language`` header. `Full description <https://www.djangoproject.com/weblog/2007/oct/26/security-fix/>`__
  54. Versions affected
  55. -----------------
  56. * Django 0.91 `(patch) <https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81>`__
  57. * Django 0.95 `(patch) <https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234>`__
  58. * Django 0.96 `(patch) <https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f>`__
  59. May 14, 2008 - CVE-2008-2302
  60. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  61. `CVE-2008-2302 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2302&cid=3>`_: XSS via admin login redirect. `Full description <https://www.djangoproject.com/weblog/2008/may/14/security/>`__
  62. Versions affected
  63. -----------------
  64. * Django 0.91 `(patch) <https://github.com/django/django/commit/50ce7fb57d>`__
  65. * Django 0.95 `(patch) <https://github.com/django/django/commit/50ce7fb57d>`__
  66. * Django 0.96 `(patch) <https://github.com/django/django/commit/7791e5c050>`__
  67. September 2, 2008 - CVE-2008-3909
  68. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  69. `CVE-2008-3909 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3909&cid=3>`_: CSRF via preservation of POST data during admin login. `Full description <https://www.djangoproject.com/weblog/2008/sep/02/security/>`__
  70. Versions affected
  71. -----------------
  72. * Django 0.91 `(patch) <https://github.com/django/django/commit/44debfeaa4473bd28872c735dd3d9afde6886752>`__
  73. * Django 0.95 `(patch) <https://github.com/django/django/commit/aee48854a164382c655acb9f18b3c06c3d238e81>`__
  74. * Django 0.96 `(patch) <https://github.com/django/django/commit/7e0972bded362bc4b851c109df2c8a6548481a8e>`__
  75. July 28, 2009 - CVE-2009-2659
  76. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  77. `CVE-2009-2659 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2659&cid=3>`_: Directory-traversal in development server media handler. `Full description <https://www.djangoproject.com/weblog/2009/jul/28/security/>`__
  78. Versions affected
  79. -----------------
  80. * Django 0.96 `(patch) <https://github.com/django/django/commit/da85d76fd6>`__
  81. * Django 1.0 `(patch) <https://github.com/django/django/commit/df7f917b7f>`__
  82. October 9, 2009 - CVE-2009-3965
  83. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  84. `CVE-2009-3965 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3695&cid=3>`_: Denial-of-service via pathological regular expression performance. `Full description <https://www.djangoproject.com/weblog/2009/oct/09/security/>`__
  85. Versions affected
  86. -----------------
  87. * Django 1.0 `(patch) <https://github.com/django/django/commit/594a28a904>`__
  88. * Django 1.1 `(patch) <https://github.com/django/django/commit/e3e992e18b>`__
  89. September 8, 2010 - CVE-2010-3082
  90. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  91. `CVE-2010-3082 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3082&cid=3>`_: XSS via trusting unsafe cookie value. `Full description <https://www.djangoproject.com/weblog/2010/sep/08/security-release/>`__
  92. Versions affected
  93. -----------------
  94. * Django 1.2 `(patch) <https://github.com/django/django/commit/7f84657b6b>`__
  95. December 22, 2010 - CVE-2010-4534
  96. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  97. `CVE-2010-4534 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4534&cid=3>`_: Information leakage in administrative interface. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  98. Versions affected
  99. -----------------
  100. * Django 1.1 `(patch) <https://github.com/django/django/commit/17084839fd>`__
  101. * Django 1.2 `(patch) <https://github.com/django/django/commit/85207a245b>`__
  102. December 22, 2010 - CVE-2010-4535
  103. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  104. `CVE-2010-4535 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4535&cid=2>`_: Denial-of-service in password-reset mechanism. `Full description <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  105. Versions affected
  106. -----------------
  107. * Django 1.1 `(patch) <https://github.com/django/django/commit/7f8dd9cbac>`__
  108. * Django 1.2 `(patch) <https://github.com/django/django/commit/d5d8942a16>`__
  109. February 8, 2011 - CVE-2011-0696
  110. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  111. `CVE-2011-0696 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0696&cid=2>`_: CSRF via forged HTTP headers. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  112. Versions affected
  113. -----------------
  114. * Django 1.1 `(patch) <https://github.com/django/django/commit/408c5c873c>`__
  115. * Django 1.2 `(patch) <https://github.com/django/django/commit/818e70344e>`__
  116. February 8, 2011 - CVE-2011-0697
  117. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  118. `CVE-2011-0697 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0697&cid=2>`_: XSS via unsanitized names of uploaded files. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  119. Versions affected
  120. -----------------
  121. * Django 1.1 `(patch) <https://github.com/django/django/commit/1966786d2d>`__
  122. * Django 1.2 `(patch) <https://github.com/django/django/commit/1f814a9547>`__
  123. February 8, 2011 - CVE-2011-0698
  124. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  125. `CVE-2011-0698 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0698&cid=2>`_: Directory-traversal on Windows via incorrect path-separator handling. `Full description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  126. Versions affected
  127. -----------------
  128. * Django 1.1 `(patch) <https://github.com/django/django/commit/570a32a047>`__
  129. * Django 1.2 `(patch) <https://github.com/django/django/commit/194566480b>`__
  130. September 9, 2011 - CVE-2011-4136
  131. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  132. `CVE-2011-4136 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4136&cid=2>`_: Session manipulation when using memory-cache-backed session. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  133. Versions affected
  134. -----------------
  135. * Django 1.2 `(patch) <https://github.com/django/django/commit/ac7c3a110f>`__
  136. * Django 1.3 `(patch) <https://github.com/django/django/commit/fbe2eead2f>`__
  137. September 9, 2011 - CVE-2011-4137
  138. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  139. `CVE-2011-4137 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4137&cid=2>`_: Denial-of-service via via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  140. Versions affected
  141. -----------------
  142. * Django 1.2 `(patch) <https://github.com/django/django/commit/7268f8af86>`__
  143. * Django 1.3 `(patch) <https://github.com/django/django/commit/1a76dbefdf>`__
  144. September 9, 2011 - CVE-2011-4138
  145. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  146. `CVE-2011-4138 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4138&cid=2>`_: Information leakage/arbitrary request issuance via ``URLField.verify_exists``. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  147. Versions affected
  148. -----------------
  149. * Django 1.2: `(patch) <https://github.com/django/django/commit/7268f8af86>`__
  150. * Django 1.3: `(patch) <https://github.com/django/django/commit/1a76dbefdf>`__
  151. September 9, 2011 - CVE-2011-4139
  152. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  153. `CVE-2011-4139 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4139&cid=2>`_: ``Host`` header cache poisoning. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  154. Versions affected
  155. -----------------
  156. * Django 1.2 `(patch) <https://github.com/django/django/commit/c613af4d64>`__
  157. * Django 1.3 `(patch) <https://github.com/django/django/commit/2f7fadc38e>`__
  158. September 9, 2011 - CVE-2011-4140
  159. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  160. `CVE-2011-4140 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4140&cid=2>`_: Potential CSRF via ``Host`` header. `Full description <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  161. Versions affected
  162. -----------------
  163. This notification was an advisory only, so no patches were issued.
  164. * Django 1.2
  165. * Django 1.3
  166. July 30, 2012 - CVE-2012-3442
  167. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  168. `CVE-2012-3442 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3442&cid=2>`_: XSS via failure to validate redirect scheme. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  169. Versions affected
  170. -----------------
  171. * Django 1.3: `(patch) <https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d>`__
  172. * Django 1.4: `(patch) <https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1>`__
  173. July 30, 2012 - CVE-2012-3443
  174. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  175. `CVE-2012-3443 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3443&cid=2>`_: Denial-of-service via compressed image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  176. Versions affected
  177. -----------------
  178. * Django 1.3: `(patch) <https://github.com/django/django/commit/b2eb4787a0fff9c9993b78be5c698e85108f3446>`__
  179. * Django 1.4: `(patch) <https://github.com/django/django/commit/c14f325c4eef628bc7bfd8873c3a72aeb0219141>`__
  180. July 30, 2012 - CVE-2012-3444
  181. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  182. `CVE-2012-3444 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3444&cid=2>`_: Denial-of-service via large image files. `Full description <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  183. Versions affected
  184. -----------------
  185. * Django 1.3 `(patch) <https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155>`__
  186. * Django 1.4 `(patch) <https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6>`__
  187. October 17, 2012 - CVE-2012-4520
  188. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  189. `CVE-2012-4520 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4520&cid=2>`_: ``Host`` header poisoning. `Full description <https://www.djangoproject.com/weblog/2012/oct/17/security/>`__
  190. Versions affected
  191. -----------------
  192. * Django 1.3 `(patch) <https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071>`__
  193. * Django 1.4 `(patch) <https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3>`__
  194. December 10, 2012 - No CVE 1
  195. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  196. Additional hardening of ``Host`` header handling. `Full description <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  197. Versions affected
  198. -----------------
  199. * Django 1.3 `(patch) <https://github.com/django/django/commit/2da4ace0bc1bc1d79bf43b368cb857f6f0cd6b1b>`__
  200. * Django 1.4 `(patch) <https://github.com/django/django/commit/319627c184e71ae267d6b7f000e293168c7b6e09>`__
  201. December 10, 2012 - No CVE 2
  202. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  203. Additional hardening of redirect validation. `Full description <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  204. Versions affected
  205. -----------------
  206. * Django 1.3: `(patch) <https://github.com/django/django/commit/1515eb46daa0897ba5ad5f0a2db8969255f1b343>`__
  207. * Django 1.4: `(patch) <https://github.com/django/django/commit/b2ae0a63aeec741f1e51bac9a95a27fd635f9652>`__
  208. February 19, 2013 - No CVE
  209. ~~~~~~~~~~~~~~~~~~~~~~~~~~
  210. Additional hardening of ``Host`` header handling. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  211. Versions affected
  212. -----------------
  213. * Django 1.3 `(patch) <https://github.com/django/django/commit/27cd872e6e36a81d0bb6f5b8765a1705fecfc253>`__
  214. * Django 1.4 `(patch) <https://github.com/django/django/commit/9936fdb11d0bbf0bd242f259bfb97bbf849d16f8>`__
  215. February 19, 2013 - CVE-2013-1664/1665
  216. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  217. `CVE-2013-1664 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1664&cid=2>`_ and `CVE-2013-1665 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1665&cid=2>`_: Entity-based attacks against Python XML libraries. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  218. Versions affected
  219. -----------------
  220. * Django 1.3 `(patch) <https://github.com/django/django/commit/d19a27066b2247102e65412aa66917aff0091112>`__
  221. * Django 1.4 `(patch) <https://github.com/django/django/commit/1c60d07ba23e0350351c278ad28d0bd5aa410b40>`__
  222. February 19, 2013 - CVE-2013-0305
  223. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  224. `CVE-2013-0305 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0305&cid=2>`_: Information leakage via admin history log. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  225. Versions affected
  226. -----------------
  227. * Django 1.3 `(patch) <https://github.com/django/django/commit/d3a45e10c8ac8268899999129daa27652ec0da35>`__
  228. * Django 1.4 `(patch) <https://github.com/django/django/commit/0e7861aec73702f7933ce2a93056f7983939f0d6>`__
  229. February 19, 2013 - CVE-2013-0306
  230. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  231. `CVE-2013-0306 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0306&cid=2>`_: Denial-of-service via formset ``max_num`` bypass. `Full description <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  232. Versions affected
  233. -----------------
  234. * Django 1.3 `(patch) <https://github.com/django/django/commit/d7094bbce8cb838f3b40f504f198c098ff1cf727>`__
  235. * Django 1.4 `(patch) <https://github.com/django/django/commit/0cc350a896f70ace18280410eb616a9197d862b0>`__
  236. August 13, 2013 - Awaiting CVE 1
  237. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  238. (CVE not yet issued): XSS via admin trusting ``URLField`` values. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  239. Versions affected
  240. -----------------
  241. * Django 1.5 `(patch) <https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78>`__
  242. August 13, 2013 - Awaiting CVE 2
  243. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  244. (CVE not yet issued): Possible XSS via unvalidated URL redirect schemes. `Full description <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  245. Versions affected
  246. -----------------
  247. * Django 1.4 `(patch) <https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a>`__
  248. * Django 1.5 `(patch) <https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f>`__
  249. September 10, 2013 - CVE-2013-4315
  250. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  251. `CVE-2013-4315 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4315&cid=2>`_ Directory-traversal via ``ssi`` template tag. `Full description <https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/>`__
  252. Versions affected
  253. -----------------
  254. * Django 1.4 `(patch) <https://github.com/django/django/commit/87d2750b39f6f2d54b7047225521a44dcd37e896>`__
  255. * Django 1.5 `(patch) <https://github.com/django/django/commit/988b61c550d798f9a66d17ee0511fb7a9a7f33ca>`__
  256. September 14, 2013 - CVE-2013-1443
  257. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  258. CVE-2013-1443: Denial-of-service via large passwords. `Full description <https://www.djangoproject.com/weblog/2013/sep/15/security/>`__
  259. Versions affected
  260. -----------------
  261. * Django 1.4 `(patch <https://github.com/django/django/commit/3f3d887a6844ec2db743fee64c9e53e04d39a368>`__ and `Python compatibility fix) <https://github.com/django/django/commit/6903d1690a92aa040adfb0c8eb37cf62e4206714>`__
  262. * Django 1.5 `(patch) <https://github.com/django/django/commit/22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc>`__
  263. April 21, 2014 - CVE-2014-2014-0472
  264. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  265. `CVE-2014-0472 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0472&cid=2>`_: Unexpected code execution using ``reverse()``. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`_
  266. Versions affected
  267. -----------------
  268. * Django 1.4 `(patch) <https://github.com/django/django/commit/c1a8c420fe4b27fb2caf5e46d23b5712fc0ac535>`__
  269. * Django 1.5 `(patch) <https://github.com/django/django/commit/2a5bcb69f42b84464b24b5c835dca6467b6aa7f1>`__
  270. * Django 1.6 `(patch) <https://github.com/django/django/commit/4352a50871e239ebcdf64eee6f0b88e714015c1b>`__
  271. * Django 1.7 `(patch) <https://github.com/django/django/commit/546740544d7f69254a67b06a3fc7fa0c43512958>`__
  272. April 21, 2014 - CVE-2014-2014-0473
  273. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  274. `CVE-2014-0473 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0473&cid=2>`_: Caching of anonymous pages could reveal CSRF token. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`_
  275. Versions affected
  276. -----------------
  277. * Django 1.4 `(patch) <https://github.com/django/django/commit/1170f285ddd6a94a65f911a27788ba49ca08c0b0>`__
  278. * Django 1.5 `(patch) <https://github.com/django/django/commit/6872f42757d7ef6a97e0b6ec5db4d2615d8a2bd8>`__
  279. * Django 1.6 `(patch) <https://github.com/django/django/commit/d63e20942f3024f24cb8cd85a49461ba8a9b6736>`__
  280. * Django 1.7 `(patch) <https://github.com/django/django/commit/380545bf85cbf17fc698d136815b7691f8d023ca>`__
  281. April 21, 2014 - CVE-2014-2014-0474
  282. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  283. `CVE-2014-0474 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0474&cid=2>`_: MySQL typecasting causes unexpected query results. `Full description <https://www.djangoproject.com/weblog/2014/apr/21/security/>`_
  284. Versions affected
  285. -----------------
  286. * Django 1.4 `(patch) <https://github.com/django/django/commit/aa80f498de6d687e613860933ac58433ab71ea4b>`__
  287. * Django 1.5 `(patch) <https://github.com/django/django/commit/985434fb1d6bf2335bf96c6ebf91c3674f1f399f>`__
  288. * Django 1.6 `(patch) <https://github.com/django/django/commit/5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292>`__
  289. * Django 1.7 `(patch) <https://github.com/django/django/commit/34526c2f56b863c2103655a0893ac801667e86ea>`__