security.txt 58 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624
  1. ==========================
  2. Archive of security issues
  3. ==========================
  4. Django's development team is strongly committed to responsible
  5. reporting and disclosure of security-related issues, as outlined in
  6. :doc:`Django's security policies </internals/security>`.
  7. As part of that commitment, we maintain the following historical list
  8. of issues which have been fixed and disclosed. For each issue, the
  9. list below includes the date, a brief description, the `CVE identifier
  10. <https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures>`_
  11. if applicable, a list of affected versions, a link to the full
  12. disclosure and links to the appropriate patch(es).
  13. Some important caveats apply to this information:
  14. * Lists of affected versions include only those versions of Django
  15. which had stable, security-supported releases at the time of
  16. disclosure. This means older versions (whose security support had
  17. expired) and versions which were in pre-release (alpha/beta/RC)
  18. states at the time of disclosure may have been affected, but are not
  19. listed.
  20. * The Django project has on occasion issued security advisories,
  21. pointing out potential security problems which can arise from
  22. improper configuration or from other issues outside of Django
  23. itself. Some of these advisories have received CVEs; when that is
  24. the case, they are listed here, but as they have no accompanying
  25. patches or releases, only the description, disclosure and CVE will
  26. be listed.
  27. Issues under Django's security process
  28. ======================================
  29. All security issues have been handled under versions of Django's security
  30. process. These are listed below.
  31. March 6, 2025 - :cve:`2025-26699`
  32. ---------------------------------
  33. Potential denial-of-service in ``django.utils.text.wrap()``.
  34. `Full description
  35. <https://www.djangoproject.com/weblog/2025/mar/06/security-releases/>`__
  36. * Django 5.1 :commit:`(patch) <8dbb44d34271637099258391dfc79df33951b841>`
  37. * Django 5.0 :commit:`(patch) <4f2765232336b8ad0afd8017d9d912ae93470017>`
  38. * Django 4.2 :commit:`(patch) <e88f7376fe68dbf4ebaf11fad1513ce700b45860>`
  39. January 14, 2025 - :cve:`2024-56374`
  40. ------------------------------------
  41. Potential denial-of-service vulnerability in IPv6 validation.
  42. `Full description
  43. <https://www.djangoproject.com/weblog/2025/jan/14/security-releases/>`__
  44. * Django 5.1 :commit:`(patch) <4806731e58f3e8700a3c802e77899d54ac6021fe>`
  45. * Django 5.0 :commit:`(patch) <e8d4a2005955dcf962193600b53bf461b190b455>`
  46. * Django 4.2 :commit:`(patch) <ad866a1ca3e7d60da888d25d27e46a8adb2ed36e>`
  47. December 4, 2024 - :cve:`2024-53907`
  48. ------------------------------------
  49. Potential denial-of-service in ``django.utils.html.strip_tags()``.
  50. `Full description
  51. <https://www.djangoproject.com/weblog/2024/dec/04/security-releases/>`__
  52. * Django 5.1 :commit:`(patch) <bbc74a7f7eb7335e913bdb4787f22e83a9be947e>`
  53. * Django 5.0 :commit:`(patch) <a5a89ea28cc550c1b29b03f9e14ef3c128ec1e84>`
  54. * Django 4.2 :commit:`(patch) <790eb058b0716c536a2f2e8d1c6d5079d776c22b>`
  55. December 4, 2024 - :cve:`2024-53908`
  56. ------------------------------------
  57. Potential SQL injection in ``HasKey(lhs, rhs)`` on Oracle.
  58. `Full description
  59. <https://www.djangoproject.com/weblog/2024/dec/04/security-releases/>`__
  60. * Django 5.1 :commit:`(patch) <6943d61818e63e77b65d8b1ae65941e8f04bd87b>`
  61. * Django 5.0 :commit:`(patch) <ff08bb6c70aa45f83a5ef3bd0b601c7c9d1a7642>`
  62. * Django 4.2 :commit:`(patch) <7376bcbf508883282ffcc0f0fac5cf0ed2d6cbc5>`
  63. September 3, 2024 - :cve:`2024-45231`
  64. -------------------------------------
  65. Potential user email enumeration via response status on password reset.
  66. `Full description
  67. <https://www.djangoproject.com/weblog/2024/sep/03/security-releases/>`__
  68. * Django 5.1 :commit:`(patch) <3c733c78d6f8e50296d6e248968b6516c92a53ca>`
  69. * Django 5.0 :commit:`(patch) <96d84047715ea1715b4bd1594e46122b8a77b9e2>`
  70. * Django 4.2 :commit:`(patch) <bf4888d317ba4506d091eeac6e8b4f1fcc731199>`
  71. September 3, 2024 - :cve:`2024-45230`
  72. -------------------------------------
  73. Potential denial-of-service vulnerability in ``django.utils.html.urlize()``.
  74. `Full description
  75. <https://www.djangoproject.com/weblog/2024/sep/03/security-releases/>`__
  76. * Django 5.1 :commit:`(patch) <022ab0a75c76ab2ea31dfcc5f2cf5501e378d397>`
  77. * Django 5.0 :commit:`(patch) <813de2672bd7361e9a453ab62cd6e52f96b6525b>`
  78. * Django 4.2 :commit:`(patch) <d147a8ebbdf28c17cafbbe2884f0bc57e2bf82e2>`
  79. August 6, 2024 - :cve:`2024-42005`
  80. ----------------------------------
  81. Potential SQL injection in ``QuerySet.values()`` and ``values_list()``.
  82. `Full description
  83. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  84. * Django 5.0 :commit:`(patch) <32ebcbf2e1fe3e5ba79a6554a167efce81f7422d>`
  85. * Django 4.2 :commit:`(patch) <f4af67b9b41e0f4c117a8741da3abbd1c869ab28>`
  86. August 6, 2024 - :cve:`2024-41991`
  87. ----------------------------------
  88. Potential denial-of-service vulnerability in ``django.utils.html.urlize()`` and
  89. ``AdminURLFieldWidget``. `Full description
  90. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  91. * Django 5.0 :commit:`(patch) <523da8771bce321023f490f70d71a9e973ddc927>`
  92. * Django 4.2 :commit:`(patch) <efea1ef7e2190e3f77ca0651b5458297bc0f6a9f>`
  93. August 6, 2024 - :cve:`2024-41990`
  94. ----------------------------------
  95. Potential denial-of-service vulnerability in ``django.utils.html.urlize()``.
  96. `Full description
  97. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  98. * Django 5.0 :commit:`(patch) <7b7b909579c8311c140c89b8a9431bf537febf93>`
  99. * Django 4.2 :commit:`(patch) <d0a82e26a74940bf0c78204933c3bdd6a283eb88>`
  100. August 6, 2024 - :cve:`2024-41989`
  101. ----------------------------------
  102. Potential memory exhaustion in ``django.utils.numberformat.floatformat()``.
  103. `Full description
  104. <https://www.djangoproject.com/weblog/2024/aug/06/security-releases/>`__
  105. * Django 5.0 :commit:`(patch) <27900fe56f3d3cabb4aeb6ccb82f92bab29073a8>`
  106. * Django 4.2 :commit:`(patch) <fc76660f589ac07e45e9cd34ccb8087aeb11904b>`
  107. July 9, 2024 - :cve:`2024-39614`
  108. --------------------------------
  109. Potential denial-of-service in
  110. ``django.utils.translation.get_supported_language_variant()``.
  111. `Full description
  112. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  113. * Django 5.0 :commit:`(patch) <8e7a44e4bec0f11474699c3111a5e0a45afe7f49>`
  114. * Django 4.2 :commit:`(patch) <17358fb35fb7217423d4c4877ccb6d1a3a40b1c3>`
  115. July 9, 2024 - :cve:`2024-39330`
  116. --------------------------------
  117. Potential directory-traversal in ``django.core.files.storage.Storage.save()``.
  118. `Full description
  119. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  120. * Django 5.0 :commit:`(patch) <9f4f63e9ebb7bf6cb9547ee4e2526b9b96703270>`
  121. * Django 4.2 :commit:`(patch) <2b00edc0151a660d1eb86da4059904a0fc4e095e>`
  122. July 9, 2024 - :cve:`2024-39329`
  123. --------------------------------
  124. Username enumeration through timing difference for users with unusable
  125. passwords. `Full description
  126. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  127. * Django 5.0 :commit:`(patch) <07cefdee4a9d1fcd9a3a631cbd07c78defd1923b>`
  128. * Django 4.2 :commit:`(patch) <156d3186c96e3ec2ca73b8b25dc2ef366e38df14>`
  129. July 9, 2024 - :cve:`2024-38875`
  130. --------------------------------
  131. Potential denial-of-service in ``django.utils.html.urlize()``.
  132. `Full description
  133. <https://www.djangoproject.com/weblog/2024/jul/09/security-releases/>`__
  134. * Django 5.0 :commit:`(patch) <7285644640f085f41d60ab0c8ae4e9153f0485db>`
  135. * Django 4.2 :commit:`(patch) <79f368764295df109a37192f6182fb6f361d85b5>`
  136. March 4, 2024 - :cve:`2024-27351`
  137. ---------------------------------
  138. Potential regular expression denial-of-service in
  139. ``django.utils.text.Truncator.words()``. `Full description
  140. <https://www.djangoproject.com/weblog/2024/mar/04/security-releases/>`__
  141. * Django 5.0 :commit:`(patch) <3394fc6132436eca89e997083bae9985fb7e761e>`
  142. * Django 4.2 :commit:`(patch) <3c9a2771cc80821e041b16eb36c1c37af5349d4a>`
  143. * Django 3.2 :commit:`(patch) <072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521>`
  144. February 6, 2024 - :cve:`2024-24680`
  145. ------------------------------------
  146. Potential denial-of-service in ``intcomma`` template filter.
  147. `Full description
  148. <https://www.djangoproject.com/weblog/2024/feb/06/security-releases/>`__
  149. * Django 5.0 :commit:`(patch) <16a8fe18a3b81250f4fa57e3f93f0599dc4895bc>`
  150. * Django 4.2 :commit:`(patch) <572ea07e84b38ea8de0551f4b4eda685d91d09d2>`
  151. * Django 3.2 :commit:`(patch) <c1171ffbd570db90ca206c30f8e2b9f691243820>`
  152. November 1, 2023 - :cve:`2023-46695`
  153. ------------------------------------
  154. Potential denial of service vulnerability in ``UsernameField`` on Windows.
  155. `Full description
  156. <https://www.djangoproject.com/weblog/2023/nov/01/security-releases/>`__
  157. * Django 4.2 :commit:`(patch) <048a9ebb6ea468426cb4e57c71572cbbd975517f>`
  158. * Django 4.1 :commit:`(patch) <4965bfdde2e5a5c883685019e57d123a3368a75e>`
  159. * Django 3.2 :commit:`(patch) <f9a7fb8466a7ba4857eaf930099b5258f3eafb2b>`
  160. October 4, 2023 - :cve:`2023-43665`
  161. -----------------------------------
  162. Denial-of-service possibility in ``django.utils.text.Truncator``.
  163. `Full description
  164. <https://www.djangoproject.com/weblog/2023/oct/04/security-releases/>`__
  165. * Django 4.2 :commit:`(patch) <be9c27c4d18c2e6a5be8af4e53c0797440794473>`
  166. * Django 4.1 :commit:`(patch) <c7b7024742250414e426ad49fb80db943e7ba4e8>`
  167. * Django 3.2 :commit:`(patch) <ccdade1a0262537868d7ca64374de3d957ca50c5>`
  168. September 4, 2023 - :cve:`2023-41164`
  169. -------------------------------------
  170. Potential denial of service vulnerability in
  171. ``django.utils.encoding.uri_to_iri()``. `Full description
  172. <https://www.djangoproject.com/weblog/2023/sep/04/security-releases/>`__
  173. * Django 4.2 :commit:`(patch) <9c51b4dcfa0cefcb48231f4d71cafa80821f87b9>`
  174. * Django 4.1 :commit:`(patch) <ba00bc5ec6a7eff5e08be438f7b5b0e9574e8ff0>`
  175. * Django 3.2 :commit:`(patch) <6f030b1149bd8fa4ba90452e77cb3edc095ce54e>`
  176. July 3, 2023 - :cve:`2023-36053`
  177. --------------------------------
  178. Potential regular expression denial of service vulnerability in
  179. ``EmailValidator``/``URLValidator``. `Full description
  180. <https://www.djangoproject.com/weblog/2023/jul/03/security-releases/>`__
  181. * Django 4.2 :commit:`(patch) <b7c5feb35a31799de6e582ad6a5a91a9de74e0f9>`
  182. * Django 4.1 :commit:`(patch) <beb3f3d55940d9aa7198bf9d424ab74e873aec3d>`
  183. * Django 3.2 :commit:`(patch) <454f2fb93437f98917283336201b4048293f7582>`
  184. May 3, 2023 - :cve:`2023-31047`
  185. -------------------------------
  186. Potential bypass of validation when uploading multiple files using one form
  187. field. `Full description
  188. <https://www.djangoproject.com/weblog/2023/may/03/security-releases/>`__
  189. * Django 4.2 :commit:`(patch) <21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd>`
  190. * Django 4.1 :commit:`(patch) <e7c3a2ccc3a562328600be05068ed9149e12ce64>`
  191. * Django 3.2 :commit:`(patch) <eed53d0011622e70b936e203005f0e6f4ac48965>`
  192. February 14, 2023 - :cve:`2023-24580`
  193. -------------------------------------
  194. Potential denial-of-service vulnerability in file uploads. `Full description
  195. <https://www.djangoproject.com/weblog/2023/feb/14/security-releases/>`__
  196. * Django 4.1 :commit:`(patch) <628b33a854a9c68ec8a0c51f382f304a0044ec92>`
  197. * Django 4.0 :commit:`(patch) <83f1ea83e4553e211c1c5a0dfc197b66d4e50432>`
  198. * Django 3.2 :commit:`(patch) <a665ed5179f5bbd3db95ce67286d0192eff041d8>`
  199. February 1, 2023 - :cve:`2023-23969`
  200. ------------------------------------
  201. Potential denial-of-service via ``Accept-Language`` headers. `Full description
  202. <https://www.djangoproject.com/weblog/2023/feb/01/security-releases/>`__
  203. * Django 4.1 :commit:`(patch) <9d7bd5a56b1ce0576e8e07a8001373576d277942>`
  204. * Django 4.0 :commit:`(patch) <4452642f193533e288a52c02efb5bbc766a68f95>`
  205. * Django 3.2 :commit:`(patch) <c7e0151fdf33e1b11d488b6f67b94fdf3a30614a>`
  206. October 4, 2022 - :cve:`2022-41323`
  207. -----------------------------------
  208. Potential denial-of-service vulnerability in internationalized URLs. `Full
  209. description
  210. <https://www.djangoproject.com/weblog/2022/oct/04/security-releases/>`__
  211. * Django 4.1 :commit:`(patch) <9d656ea51d9ea7105c0c0785783ac29d426a7d25>`
  212. * Django 4.0 :commit:`(patch) <23f0093125ac2e553da6c1b2f9988eb6a3dd2ea1>`
  213. * Django 3.2 :commit:`(patch) <5b6b257fa7ec37ff27965358800c67e2dd11c924>`
  214. August 3, 2022 - :cve:`2022-36359`
  215. ----------------------------------
  216. Potential reflected file download vulnerability in FileResponse. `Full
  217. description
  218. <https://www.djangoproject.com/weblog/2022/aug/03/security-releases/>`__
  219. * Django 4.0 :commit:`(patch) <b7d9529cbe0af4adabb6ea5d01ed8dcce3668fb3>`
  220. * Django 3.2 :commit:`(patch) <b3e4494d759202a3b6bf247fd34455bf13be5b80>`
  221. July 4, 2022 - :cve:`2022-34265`
  222. --------------------------------
  223. Potential SQL injection via ``Trunc(kind)`` and ``Extract(lookup_name)``
  224. arguments. `Full description
  225. <https://www.djangoproject.com/weblog/2022/jul/04/security-releases/>`__
  226. * Django 4.0 :commit:`(patch) <0dc9c016fadb71a067e5a42be30164e3f96c0492>`
  227. * Django 3.2 :commit:`(patch) <a9010fe5555e6086a9d9ae50069579400ef0685e>`
  228. April 11, 2022 - :cve:`2022-28346`
  229. ----------------------------------
  230. Potential SQL injection in ``QuerySet.annotate()``, ``aggregate()``, and
  231. ``extra()``. `Full description
  232. <https://www.djangoproject.com/weblog/2022/apr/11/security-releases/>`__
  233. * Django 4.0 :commit:`(patch) <800828887a0509ad1162d6d407e94d8de7eafc60>`
  234. * Django 3.2 :commit:`(patch) <2044dac5c6968441be6f534c4139bcf48c5c7e48>`
  235. * Django 2.2 :commit:`(patch) <2c09e68ec911919360d5f8502cefc312f9e03c5d>`
  236. April 11, 2022 - :cve:`2022-28347`
  237. ----------------------------------
  238. Potential SQL injection via ``QuerySet.explain(**options)`` on PostgreSQL.
  239. `Full description
  240. <https://www.djangoproject.com/weblog/2022/apr/11/security-releases/>`__
  241. * Django 4.0 :commit:`(patch) <00b0fc50e1738c7174c495464a5ef069408a4402>`
  242. * Django 3.2 :commit:`(patch) <9e19accb6e0a00ba77d5a95a91675bf18877c72d>`
  243. * Django 2.2 :commit:`(patch) <29a6c98b4c13af82064f993f0acc6e8fafa4d3f5>`
  244. February 1, 2022 - :cve:`2022-22818`
  245. ------------------------------------
  246. Possible XSS via ``{% debug %}`` template tag. `Full description
  247. <https://www.djangoproject.com/weblog/2022/feb/01/security-releases/>`__
  248. Versions affected
  249. ~~~~~~~~~~~~~~~~~
  250. * Django 4.0 :commit:`(patch) <01422046065d2b51f8f613409cad2c81b39487e5>`
  251. * Django 3.2 :commit:`(patch) <1a1e8278c46418bde24c86a65443b0674bae65e2>`
  252. * Django 2.2 :commit:`(patch) <c27a7eb9f40b64990398978152e62b6ff839c2e6>`
  253. February 1, 2022 - :cve:`2022-23833`
  254. ------------------------------------
  255. Denial-of-service possibility in file uploads. `Full description
  256. <https://www.djangoproject.com/weblog/2022/feb/01/security-releases/>`__
  257. Versions affected
  258. ~~~~~~~~~~~~~~~~~
  259. * Django 4.0 :commit:`(patch) <f9c7d48fdd6f198a6494a9202f90242f176e4fc9>`
  260. * Django 3.2 :commit:`(patch) <d16133568ef9c9b42cb7a08bdf9ff3feec2e5468>`
  261. * Django 2.2 :commit:`(patch) <c477b761804984c932704554ad35f78a2e230c6a>`
  262. January 4, 2022 - :cve:`2021-45452`
  263. ------------------------------------
  264. Potential directory-traversal via ``Storage.save()``. `Full description
  265. <https://www.djangoproject.com/weblog/2022/jan/04/security-releases/>`__
  266. Versions affected
  267. ~~~~~~~~~~~~~~~~~
  268. * Django 4.0 :commit:`(patch) <e1592e0f26302e79856cc7f2218ae848ae19b0f6>`
  269. * Django 3.2 :commit:`(patch) <8d2f7cff76200cbd2337b2cf1707e383eb1fb54b>`
  270. * Django 2.2 :commit:`(patch) <4cb35b384ceef52123fc66411a73c36a706825e1>`
  271. January 4, 2022 - :cve:`2021-45116`
  272. ------------------------------------
  273. Potential information disclosure in ``dictsort`` template filter. `Full
  274. description
  275. <https://www.djangoproject.com/weblog/2022/jan/04/security-releases/>`__
  276. Versions affected
  277. ~~~~~~~~~~~~~~~~~
  278. * Django 4.0 :commit:`(patch) <2a8ec7f546d6d5806e221ec948c5146b55bd7489>`
  279. * Django 3.2 :commit:`(patch) <c7fe895bca06daf12cc1670b56eaf72a1ef27a16>`
  280. * Django 2.2 :commit:`(patch) <c9f648ccfac5ab90fb2829a66da4f77e68c7f93a>`
  281. January 4, 2022 - :cve:`2021-45115`
  282. ------------------------------------
  283. Denial-of-service possibility in ``UserAttributeSimilarityValidator``. `Full
  284. description
  285. <https://www.djangoproject.com/weblog/2022/jan/04/security-releases/>`__
  286. Versions affected
  287. ~~~~~~~~~~~~~~~~~
  288. * Django 4.0 :commit:`(patch) <df79ef03ac867c93caaa6be56bc69e66abfeef8f>`
  289. * Django 3.2 :commit:`(patch) <a8b32fe13bcaed1c0b772fdc53de84abc224fb20>`
  290. * Django 2.2 :commit:`(patch) <2135637fdd5ce994de110affef9e67dffdf77277>`
  291. December 7, 2021 - :cve:`2021-44420`
  292. ------------------------------------
  293. Potential bypass of an upstream access control based on URL paths. `Full
  294. description
  295. <https://www.djangoproject.com/weblog/2021/dec/07/security-releases/>`__
  296. Versions affected
  297. ~~~~~~~~~~~~~~~~~
  298. * Django 3.2 :commit:`(patch) <333c65603032c377e682cdbd7388657a5463a05a>`
  299. * Django 3.1 :commit:`(patch) <22bd17488159601bf0741b70ae7932bffea8eced>`
  300. * Django 2.2 :commit:`(patch) <7cf7d74e8a754446eeb85cacf2fef1247e0cb6d7>`
  301. July 1, 2021 - :cve:`2021-35042`
  302. --------------------------------
  303. Potential SQL injection via unsanitized ``QuerySet.order_by()`` input. `Full
  304. description
  305. <https://www.djangoproject.com/weblog/2021/jul/01/security-releases/>`__
  306. Versions affected
  307. ~~~~~~~~~~~~~~~~~
  308. * Django 3.2 :commit:`(patch) <a34a5f724c5d5adb2109374ba3989ebb7b11f81f>`
  309. * Django 3.1 :commit:`(patch) <0bd57a879a0d54920bb9038a732645fb917040e9>`
  310. June 2, 2021 - :cve:`2021-33203`
  311. --------------------------------
  312. Potential directory traversal via ``admindocs``. `Full description
  313. <https://www.djangoproject.com/weblog/2021/jun/02/security-releases/>`__
  314. Versions affected
  315. ~~~~~~~~~~~~~~~~~
  316. * Django 3.2 :commit:`(patch) <dfaba12cda060b8b292ae1d271b44bf810b1c5b9>`
  317. * Django 3.1 :commit:`(patch) <20c67a0693c4ede2b09af02574823485e82e4c8f>`
  318. * Django 2.2 :commit:`(patch) <053cc9534d174dc89daba36724ed2dcb36755b90>`
  319. June 2, 2021 - :cve:`2021-33571`
  320. --------------------------------
  321. Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted
  322. leading zeros in IPv4 addresses. `Full description
  323. <https://www.djangoproject.com/weblog/2021/jun/02/security-releases/>`__
  324. Versions affected
  325. ~~~~~~~~~~~~~~~~~
  326. * Django 3.2 :commit:`(patch) <9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d>`
  327. * Django 3.1 :commit:`(patch) <203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e>`
  328. * Django 2.2 :commit:`(patch) <f27c38ab5d90f68c9dd60cabef248a570c0be8fc>`
  329. May 6, 2021 - :cve:`2021-32052`
  330. -------------------------------
  331. Header injection possibility since ``URLValidator`` accepted newlines in input
  332. on Python 3.9.5+. `Full description
  333. <https://www.djangoproject.com/weblog/2021/may/06/security-releases/>`__
  334. Versions affected
  335. ~~~~~~~~~~~~~~~~~
  336. * Django 3.2 :commit:`(patch) <2d2c1d0c97832860fbd6597977e2aae17dd7e5b2>`
  337. * Django 3.1 :commit:`(patch) <afb23f5929944a407e4990edef1c7806a94c9879>`
  338. * Django 2.2 :commit:`(patch) <d9594c4ea57b6309d93879805302cec9ae9f23ff>`
  339. May 4, 2021 - :cve:`2021-31542`
  340. -------------------------------
  341. Potential directory-traversal via uploaded files. `Full description
  342. <https://www.djangoproject.com/weblog/2021/may/04/security-releases/>`__
  343. Versions affected
  344. ~~~~~~~~~~~~~~~~~
  345. * Django 3.2 :commit:`(patch) <c98f446c188596d4ba6de71d1b77b4a6c5c2a007>`
  346. * Django 3.1 :commit:`(patch) <25d84d64122c15050a0ee739e859f22ddab5ac48>`
  347. * Django 2.2 :commit:`(patch) <04ac1624bdc2fa737188401757cf95ced122d26d>`
  348. April 6, 2021 - :cve:`2021-28658`
  349. ---------------------------------
  350. Potential directory-traversal via uploaded files. `Full description
  351. <https://www.djangoproject.com/weblog/2021/apr/06/security-releases/>`__
  352. Versions affected
  353. ~~~~~~~~~~~~~~~~~
  354. * Django 3.2 :commit:`(patch) <2820fd1be5dfccbf1216c3845fad8580502473e1>`
  355. * Django 3.1 :commit:`(patch) <cca0d98118cccf9ae0c6dcf2d6c57fc50469fbf0>`
  356. * Django 3.0 :commit:`(patch) <e7fba62248f604c76da4f23dcf1db4a57b0808ea>`
  357. * Django 2.2 :commit:`(patch) <4036d62bda0e9e9f6172943794b744a454ca49c2>`
  358. February 19, 2021 - :cve:`2021-23336`
  359. -------------------------------------
  360. Web cache poisoning via ``django.utils.http.limited_parse_qsl()``. `Full
  361. description
  362. <https://www.djangoproject.com/weblog/2021/feb/19/security-releases/>`__
  363. Versions affected
  364. ~~~~~~~~~~~~~~~~~
  365. * Django 3.2 :commit:`(patch) <be8237c7cce24b06aabde0b97afce98ddabbe3b6>`
  366. * Django 3.1 :commit:`(patch) <8f6d431b08cbb418d9144b976e7b972546607851>`
  367. * Django 3.0 :commit:`(patch) <326a926beef869d3341bc9ef737887f0449b6b71>`
  368. * Django 2.2 :commit:`(patch) <fd6b6afd5959b638c62dbf4839ccff97e7f7dfda>`
  369. February 1, 2021 - :cve:`2021-3281`
  370. -----------------------------------
  371. Potential directory-traversal via ``archive.extract()``. `Full description
  372. <https://www.djangoproject.com/weblog/2021/feb/01/security-releases/>`__
  373. Versions affected
  374. ~~~~~~~~~~~~~~~~~
  375. * Django 3.1 :commit:`(patch) <02e6592835b4559909aa3aaaf67988fef435f624>`
  376. * Django 3.0 :commit:`(patch) <52e409ed17287e9aabda847b6afe58be2fa9f86a>`
  377. * Django 2.2 :commit:`(patch) <21e7622dec1f8612c85c2fc37fe8efbfd3311e37>`
  378. September 1, 2020 - :cve:`2020-24584`
  379. -------------------------------------
  380. Permission escalation in intermediate-level directories of the file system
  381. cache on Python 3.7+. `Full description
  382. <https://www.djangoproject.com/weblog/2020/sep/01/security-releases/>`__
  383. Versions affected
  384. ~~~~~~~~~~~~~~~~~
  385. * Django 3.1 :commit:`(patch) <2b099caa5923afa8cfb5f1e8c0d56b6e0e81915b>`
  386. * Django 3.0 :commit:`(patch) <cdb367c92a0ba72ddc0cbd13ff42b0e6df709554>`
  387. * Django 2.2 :commit:`(patch) <a3aebfdc8153dc230686b6d2454ccd32ed4c9e6f>`
  388. September 1, 2020 - :cve:`2020-24583`
  389. -------------------------------------
  390. Incorrect permissions on intermediate-level directories on Python 3.7+. `Full
  391. description
  392. <https://www.djangoproject.com/weblog/2020/sep/01/security-releases/>`__
  393. Versions affected
  394. ~~~~~~~~~~~~~~~~~
  395. * Django 3.1 :commit:`(patch) <934430d22aa5d90c2ba33495ff69a6a1d997d584>`
  396. * Django 3.0 :commit:`(patch) <08892bffd275c79ee1f8f67639eb170aaaf1181e>`
  397. * Django 2.2 :commit:`(patch) <375657a71c889c588f723469bd868bd1d40c369f>`
  398. June 3, 2020 - :cve:`2020-13596`
  399. --------------------------------
  400. Possible XSS via admin ``ForeignKeyRawIdWidget``. `Full description
  401. <https://www.djangoproject.com/weblog/2020/jun/03/security-releases/>`__
  402. Versions affected
  403. ~~~~~~~~~~~~~~~~~
  404. * Django 3.0 :commit:`(patch) <1f2dd37f6fcefdd10ed44cb233b2e62b520afb38>`
  405. * Django 2.2 :commit:`(patch) <6d61860b22875f358fac83d903dc629897934815>`
  406. June 3, 2020 - :cve:`2020-13254`
  407. --------------------------------
  408. Potential data leakage via malformed memcached keys. `Full description
  409. <https://www.djangoproject.com/weblog/2020/jun/03/security-releases/>`__
  410. Versions affected
  411. ~~~~~~~~~~~~~~~~~
  412. * Django 3.0 :commit:`(patch) <84b2da5552e100ae3294f564f6c862fef8d0e693>`
  413. * Django 2.2 :commit:`(patch) <07e59caa02831c4569bbebb9eb773bdd9cb4b206>`
  414. March 4, 2020 - :cve:`2020-9402`
  415. --------------------------------
  416. Potential SQL injection via ``tolerance`` parameter in GIS functions and
  417. aggregates on Oracle. `Full description
  418. <https://www.djangoproject.com/weblog/2020/mar/04/security-releases/>`__
  419. Versions affected
  420. ~~~~~~~~~~~~~~~~~
  421. * Django 3.0 :commit:`(patch) <26a5cf834526e291db00385dd33d319b8271fc4c>`
  422. * Django 2.2 :commit:`(patch) <fe886a3b58a93cfbe8864b485f93cb6d426cd1f2>`
  423. * Django 1.11 :commit:`(patch) <02d97f3c9a88adc890047996e5606180bd1c6166>`
  424. February 3, 2020 - :cve:`2020-7471`
  425. -----------------------------------
  426. Potential SQL injection via ``StringAgg(delimiter)``. `Full description
  427. <https://www.djangoproject.com/weblog/2020/feb/03/security-releases/>`__
  428. Versions affected
  429. ~~~~~~~~~~~~~~~~~
  430. * Django 3.0 :commit:`(patch) <505826b469b16ab36693360da9e11fd13213421b>`
  431. * Django 2.2 :commit:`(patch) <c67a368c16e4680b324b4f385398d638db4d8147>`
  432. * Django 1.11 :commit:`(patch) <001b0634cd309e372edb6d7d95d083d02b8e37bd>`
  433. December 18, 2019 - :cve:`2019-19844`
  434. -------------------------------------
  435. Potential account hijack via password reset form. `Full description
  436. <https://www.djangoproject.com/weblog/2019/dec/18/security-releases/>`__
  437. Versions affected
  438. ~~~~~~~~~~~~~~~~~
  439. * Django 3.0 :commit:`(patch) <302a4ff1e8b1c798aab97673909c7a3dfda42c26>`
  440. * Django 2.2 :commit:`(patch) <4d334bea06cac63dc1272abcec545b85136cca0e>`
  441. * Django 1.11 :commit:`(patch) <f4cff43bf921fcea6a29b726eb66767f67753fa2>`
  442. December 2, 2019 - :cve:`2019-19118`
  443. ------------------------------------
  444. Privilege escalation in the Django admin. `Full description
  445. <https://www.djangoproject.com/weblog/2019/dec/02/security-releases/>`__
  446. Versions affected
  447. ~~~~~~~~~~~~~~~~~
  448. * Django 3.0 :commit:`(patch) <092cd66cf3c3e175acce698d6ca2012068d878fa>`
  449. * Django 2.2 :commit:`(patch) <36f580a17f0b3cb087deadf3b65eea024f479c21>`
  450. * Django 2.1 :commit:`(patch) <103ebe2b5ff1b2614b85a52c239f471904d26244>`
  451. August 1, 2019 - :cve:`2019-14235`
  452. ----------------------------------
  453. Potential memory exhaustion in ``django.utils.encoding.uri_to_iri()``. `Full
  454. description
  455. <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  456. Versions affected
  457. ~~~~~~~~~~~~~~~~~
  458. * Django 2.2 :commit:`(patch) <cf694e6852b0da7799f8b53f1fb2f7d20cf17534>`
  459. * Django 2.1 :commit:`(patch) <5d50a2e5fa36ad23ab532fc54cf4073de84b3306>`
  460. * Django 1.11 :commit:`(patch) <869b34e9b3be3a4cfcb3a145f218ffd3f5e3fd79>`
  461. August 1, 2019 - :cve:`2019-14234`
  462. ----------------------------------
  463. SQL injection possibility in key and index lookups for
  464. ``JSONField``/``HStoreField``. `Full description
  465. <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  466. Versions affected
  467. ~~~~~~~~~~~~~~~~~
  468. * Django 2.2 :commit:`(patch) <4f5b58f5cd3c57fee9972ab074f8dc6895d8f387>`
  469. * Django 2.1 :commit:`(patch) <f74b3ae3628c26e1b4f8db3d13a91d52a833a975>`
  470. * Django 1.11 :commit:`(patch) <ed682a24fca774818542757651bfba576c3fc3ef>`
  471. August 1, 2019 - :cve:`2019-14233`
  472. ----------------------------------
  473. Denial-of-service possibility in ``strip_tags()``. `Full description
  474. <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  475. Versions affected
  476. ~~~~~~~~~~~~~~~~~
  477. * Django 2.2 :commit:`(patch) <e34f3c0e9ee5fc9022428fe91640638bafd4cda7>`
  478. * Django 2.1 :commit:`(patch) <5ff8e791148bd451180124d76a55cb2b2b9556eb>`
  479. * Django 1.11 :commit:`(patch) <52479acce792ad80bb0f915f20b835f919993c72>`
  480. August 1, 2019 - :cve:`2019-14232`
  481. ----------------------------------
  482. Denial-of-service possibility in ``django.utils.text.Truncator``. `Full
  483. description <https://www.djangoproject.com/weblog/2019/aug/01/security-releases/>`__
  484. Versions affected
  485. ~~~~~~~~~~~~~~~~~
  486. * Django 2.2 :commit:`(patch) <c3289717c6f21a8cf23daff1c78c0c014b94041f>`
  487. * Django 2.1 :commit:`(patch) <c23723a1551340cc7d3126f04fcfd178fa224193>`
  488. * Django 1.11 :commit:`(patch) <42a66e969023c00536256469f0e8b8a099ef109d>`
  489. July 1, 2019 - :cve:`2019-12781`
  490. --------------------------------
  491. Incorrect HTTP detection with reverse-proxy connecting via HTTPS. `Full
  492. description <https://www.djangoproject.com/weblog/2019/jul/01/security-releases/>`__
  493. Versions affected
  494. ~~~~~~~~~~~~~~~~~
  495. * Django 2.2 :commit:`(patch) <77706a3e4766da5d5fb75c4db22a0a59a28e6cd6>`
  496. * Django 2.1 :commit:`(patch) <1e40f427bb8d0fb37cc9f830096a97c36c97af6f>`
  497. * Django 1.11 :commit:`(patch) <32124fc41e75074141b05f10fc55a4f01ff7f050>`
  498. June 3, 2019 - :cve:`2019-12308`
  499. --------------------------------
  500. XSS via "Current URL" link generated by ``AdminURLFieldWidget``. `Full
  501. description <https://www.djangoproject.com/weblog/2019/jun/03/security-releases/>`__
  502. Versions affected
  503. ~~~~~~~~~~~~~~~~~
  504. * Django 2.2 :commit:`(patch) <afddabf8428ddc89a332f7a78d0d21eaf2b5a673>`
  505. * Django 2.1 :commit:`(patch) <09186a13d975de6d049f8b3e05484f66b01ece62>`
  506. * Django 1.11 :commit:`(patch) <c238701859a52d584f349cce15d56c8e8137c52b>`
  507. June 3, 2019 - :cve:`2019-11358`
  508. --------------------------------
  509. Prototype pollution in bundled jQuery. `Full description
  510. <https://www.djangoproject.com/weblog/2019/jun/03/security-releases/>`__
  511. Versions affected
  512. ~~~~~~~~~~~~~~~~~
  513. * Django 2.2 :commit:`(patch) <baaf187a4e354bf3976c51e2c83a0d2f8ee6e6ad>`
  514. * Django 2.1 :commit:`(patch) <95649bc08547a878cebfa1d019edec8cb1b80829>`
  515. February 11, 2019 - :cve:`2019-6975`
  516. ------------------------------------
  517. Memory exhaustion in ``django.utils.numberformat.format()``. `Full description
  518. <https://www.djangoproject.com/weblog/2019/feb/11/security-releases/>`__
  519. Versions affected
  520. ~~~~~~~~~~~~~~~~~
  521. * Django 2.1 :commit:`(patch) <40cd19055773705301c3428ed5e08a036d2091f3>`
  522. * Django 2.0 :commit:`(patch <1f42f82566c9d2d73aff1c42790d6b1b243f7676>` and
  523. :commit:`correction) <392e040647403fc8007708d52ce01d915b014849>`
  524. * Django 1.11 :commit:`(patch) <0bbb560183fabf0533289700845dafa94951f227>`
  525. January 4, 2019 - :cve:`2019-3498`
  526. ----------------------------------
  527. Content spoofing possibility in the default 404 page. `Full description
  528. <https://www.djangoproject.com/weblog/2019/jan/04/security-releases/>`__
  529. Versions affected
  530. ~~~~~~~~~~~~~~~~~
  531. * Django 2.1 :commit:`(patch) <64d2396e83aedba3fcc84ca40f23fbd22f0b9b5b>`
  532. * Django 2.0 :commit:`(patch) <9f4ed7c94c62e21644ef5115e393ac426b886f2e>`
  533. * Django 1.11 :commit:`(patch) <1cd00fcf52d089ef0fe03beabd05d59df8ea052a>`
  534. October 1, 2018 - :cve:`2018-16984`
  535. -----------------------------------
  536. Password hash disclosure to "view only" admin users. `Full description
  537. <https://www.djangoproject.com/weblog/2018/oct/01/security-release/>`__
  538. Versions affected
  539. ~~~~~~~~~~~~~~~~~
  540. * Django 2.1 :commit:`(patch) <c4bd5b597e0aa2432e4c867b86650f18af117851>`
  541. August 1, 2018 - :cve:`2018-14574`
  542. ----------------------------------
  543. Open redirect possibility in ``CommonMiddleware``. `Full description
  544. <https://www.djangoproject.com/weblog/2018/aug/01/security-releases/>`__
  545. Versions affected
  546. ~~~~~~~~~~~~~~~~~
  547. * Django 2.1 :commit:`(patch) <c4e5ff7fdb5fce447675e90291fd33fddd052b3c>`
  548. * Django 2.0 :commit:`(patch) <6fffc3c6d420e44f4029d5643f38d00a39b08525>`
  549. * Django 1.11 :commit:`(patch) <d6eaee092709aad477a9894598496c6deec532ff>`
  550. March 6, 2018 - :cve:`2018-7537`
  551. --------------------------------
  552. Denial-of-service possibility in ``truncatechars_html`` and
  553. ``truncatewords_html`` template filters. `Full description
  554. <https://www.djangoproject.com/weblog/2018/mar/06/security-releases/>`__
  555. Versions affected
  556. ~~~~~~~~~~~~~~~~~
  557. * Django 2.0 :commit:`(patch) <94c5da1d17a6b0d378866c66b605102c19f7988c>`
  558. * Django 1.11 :commit:`(patch) <a91436360b79a6ff995c3e5018bcc666dfaf1539>`
  559. * Django 1.8 :commit:`(patch) <d17974a287a6ea2e361daff88fcc004cbd6835fa>`
  560. March 6, 2018 - :cve:`2018-7536`
  561. --------------------------------
  562. Denial-of-service possibility in ``urlize`` and ``urlizetrunc`` template
  563. filters. `Full description
  564. <https://www.djangoproject.com/weblog/2018/mar/06/security-releases/>`__
  565. Versions affected
  566. ~~~~~~~~~~~~~~~~~
  567. * Django 2.0 :commit:`(patch) <e157315da3ae7005fa0683ffc9751dbeca7306c8>`
  568. * Django 1.11 :commit:`(patch) <abf89d729f210c692a50e0ad3f75fb6bec6fae16>`
  569. * Django 1.8 :commit:`(patch) <1ca63a66ef3163149ad822701273e8a1844192c2>`
  570. February 1, 2018 - :cve:`2018-6188`
  571. -----------------------------------
  572. Information leakage in ``AuthenticationForm``. `Full description
  573. <https://www.djangoproject.com/weblog/2018/feb/01/security-releases/>`__
  574. Versions affected
  575. ~~~~~~~~~~~~~~~~~
  576. * Django 2.0 :commit:`(patch) <c37bb28677295f6edda61d8ac461014ef0d3aeb2>`
  577. * Django 1.11 :commit:`(patch) <57b95fedad5e0b83fc9c81466b7d1751c6427aae>`
  578. September 5, 2017 - :cve:`2017-12794`
  579. -------------------------------------
  580. Possible XSS in traceback section of technical 500 debug page. `Full
  581. description <https://www.djangoproject.com/weblog/2017/sep/05/security-releases/>`__
  582. Versions affected
  583. ~~~~~~~~~~~~~~~~~
  584. * Django 1.11 :commit:`(patch) <e35a0c56086924f331e9422daa266e907a4784cc>`
  585. * Django 1.10 :commit:`(patch) <58e08e80e362db79eb0fd775dc81faad90dca47a>`
  586. April 4, 2017 - :cve:`2017-7234`
  587. --------------------------------
  588. Open redirect vulnerability in ``django.views.static.serve()``. `Full
  589. description <https://www.djangoproject.com/weblog/2017/apr/04/security-releases/>`__
  590. Versions affected
  591. ~~~~~~~~~~~~~~~~~
  592. * Django 1.10 :commit:`(patch) <2a9f6ef71b8e23fd267ee2be1be26dde8ab67037>`
  593. * Django 1.9 :commit:`(patch) <5f1ffb07afc1e59729ce2b283124116d6c0659e4>`
  594. * Django 1.8 :commit:`(patch) <4a6b945dffe8d10e7cec107d93e6efaebfbded29>`
  595. April 4, 2017 - :cve:`2017-7233`
  596. --------------------------------
  597. Open redirect and possible XSS attack via user-supplied numeric redirect URLs.
  598. `Full description <https://www.djangoproject.com/weblog/2017/apr/04/security-releases/>`__
  599. Versions affected
  600. ~~~~~~~~~~~~~~~~~
  601. * Django 1.10 :commit:`(patch) <f824655bc2c50b19d2f202d7640785caabc82787>`
  602. * Django 1.9 :commit:`(patch) <254326cb3682389f55f886804d2c43f7b9f23e4f>`
  603. * Django 1.8 :commit:`(patch) <8339277518c7d8ec280070a780915304654e3b66>`
  604. November 1, 2016 - :cve:`2016-9014`
  605. -----------------------------------
  606. DNS rebinding vulnerability when ``DEBUG=True``. `Full description
  607. <https://www.djangoproject.com/weblog/2016/nov/01/security-releases/>`__
  608. Versions affected
  609. ~~~~~~~~~~~~~~~~~
  610. * Django 1.10 :commit:`(patch) <884e113838e5a72b4b0ec9e5e87aa480f6aa4472>`
  611. * Django 1.9 :commit:`(patch) <45acd6d836895a4c36575f48b3fb36a3dae98d19>`
  612. * Django 1.8 :commit:`(patch) <c401ae9a7dfb1a94a8a61927ed541d6f93089587>`
  613. November 1, 2016 - :cve:`2016-9013`
  614. -----------------------------------
  615. User with hardcoded password created when running tests on Oracle. `Full
  616. description <https://www.djangoproject.com/weblog/2016/nov/01/security-releases/>`__
  617. Versions affected
  618. ~~~~~~~~~~~~~~~~~
  619. * Django 1.10 :commit:`(patch) <34e10720d81b8d407aa14d763b6a7fe8f13b4f2e>`
  620. * Django 1.9 :commit:`(patch) <4844d86c7728c1a5a3bbce4ad336a8d32304072b>`
  621. * Django 1.8 :commit:`(patch) <70f99952965a430daf69eeb9947079aae535d2d0>`
  622. September 26, 2016 - :cve:`2016-7401`
  623. -------------------------------------
  624. CSRF protection bypass on a site with Google Analytics. `Full description
  625. <https://www.djangoproject.com/weblog/2016/sep/26/security-releases/>`__
  626. Versions affected
  627. ~~~~~~~~~~~~~~~~~
  628. * Django 1.9 :commit:`(patch) <d1bc980db1c0fffd6d60677e62f70beadb9fe64a>`
  629. * Django 1.8 :commit:`(patch) <6118ab7d0676f0d622278e5be215f14fb5410b6a>`
  630. July 18, 2016 - :cve:`2016-6186`
  631. --------------------------------
  632. XSS in admin's add/change related popup. `Full description
  633. <https://www.djangoproject.com/weblog/2016/jul/18/security-releases/>`__
  634. Versions affected
  635. ~~~~~~~~~~~~~~~~~
  636. * Django 1.9 :commit:`(patch) <d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158>`
  637. * Django 1.8 :commit:`(patch) <f68e5a99164867ab0e071a936470958ed867479d>`
  638. March 1, 2016 - :cve:`2016-2513`
  639. --------------------------------
  640. User enumeration through timing difference on password hasher work factor
  641. upgrade. `Full description
  642. <https://www.djangoproject.com/weblog/2016/mar/01/security-releases/>`__
  643. Versions affected
  644. ~~~~~~~~~~~~~~~~~
  645. * Django 1.9 :commit:`(patch) <af7d09b0c5c6ab68e629fd9baf736f9dd203b18e>`
  646. * Django 1.8 :commit:`(patch) <f4e6e02f7713a6924d16540be279909ff4091eb6>`
  647. March 1, 2016 - :cve:`2016-2512`
  648. --------------------------------
  649. Malicious redirect and possible XSS attack via user-supplied redirect URLs
  650. containing basic auth. `Full description
  651. <https://www.djangoproject.com/weblog/2016/mar/01/security-releases/>`__
  652. Versions affected
  653. ~~~~~~~~~~~~~~~~~
  654. * Django 1.9 :commit:`(patch) <fc6d147a63f89795dbcdecb0559256470fff4380>`
  655. * Django 1.8 :commit:`(patch) <382ab137312961ad62feb8109d70a5a581fe8350>`
  656. February 1, 2016 - :cve:`2016-2048`
  657. -----------------------------------
  658. User with "change" but not "add" permission can create objects for
  659. ``ModelAdmin``’s with ``save_as=True``. `Full description
  660. <https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/>`__
  661. Versions affected
  662. ~~~~~~~~~~~~~~~~~
  663. * Django 1.9 :commit:`(patch) <adbca5e4db42542575734b8e5d26961c8ada7265>`
  664. November 24, 2015 - :cve:`2015-8213`
  665. ------------------------------------
  666. Settings leak possibility in ``date`` template filter. `Full description
  667. <https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/>`__
  668. Versions affected
  669. ~~~~~~~~~~~~~~~~~
  670. * Django 1.8 :commit:`(patch) <9f83fc2f66f5a0bac7c291aec55df66050bb6991>`
  671. * Django 1.7 :commit:`(patch) <8a01c6b53169ee079cb21ac5919fdafcc8c5e172>`
  672. August 18, 2015 - :cve:`2015-5963` / :cve:`2015-5964`
  673. -----------------------------------------------------
  674. Denial-of-service possibility in ``logout()`` view by filling session store.
  675. `Full description <https://www.djangoproject.com/weblog/2015/aug/18/security-releases/>`__
  676. Versions affected
  677. ~~~~~~~~~~~~~~~~~
  678. * Django 1.8 :commit:`(patch) <2eb86b01d7b59be06076f6179a454d0fd0afaff6>`
  679. * Django 1.7 :commit:`(patch) <2f5485346ee6f84b4e52068c04e043092daf55f7>`
  680. * Django 1.4 :commit:`(patch) <575f59f9bc7c59a5e41a081d1f5f55fc859c5012>`
  681. July 8, 2015 - :cve:`2015-5145`
  682. -------------------------------
  683. Denial-of-service possibility in URL validation. `Full description
  684. <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  685. Versions affected
  686. ~~~~~~~~~~~~~~~~~
  687. * Django 1.8 :commit:`(patch) <8f9a4d3a2bc42f14bb437defd30c7315adbff22c>`
  688. July 8, 2015 - :cve:`2015-5144`
  689. -------------------------------
  690. Header injection possibility since validators accept newlines in input. `Full
  691. description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  692. Versions affected
  693. ~~~~~~~~~~~~~~~~~
  694. * Django 1.8 :commit:`(patch) <574dd5e0b0fbb877ae5827b1603d298edc9bb2a0>`
  695. * Django 1.7 :commit:`(patch) <ae49b4d994656bc037513dcd064cb9ce5bb85649>`
  696. * Django 1.4 :commit:`(patch) <1ba1cdce7d58e6740fe51955d945b56ae51d072a>`
  697. July 8, 2015 - :cve:`2015-5143`
  698. -------------------------------
  699. Denial-of-service possibility by filling session store. `Full
  700. description <https://www.djangoproject.com/weblog/2015/jul/08/security-releases/>`__
  701. Versions affected
  702. ~~~~~~~~~~~~~~~~~
  703. * Django 1.8 :commit:`(patch) <66d12d1ababa8f062857ee5eb43276493720bf16>`
  704. * Django 1.7 :commit:`(patch) <1828f4341ec53a8684112d24031b767eba557663>`
  705. * Django 1.4 :commit:`(patch) <2e47f3e401c29bc2ba5ab794d483cb0820855fb9>`
  706. May 20, 2015 - :cve:`2015-3982`
  707. -------------------------------
  708. Fixed session flushing in the cached_db backend. `Full description
  709. <https://www.djangoproject.com/weblog/2015/may/20/security-release/>`__
  710. Versions affected
  711. ~~~~~~~~~~~~~~~~~
  712. * Django 1.8 :commit:`(patch) <31cb25adecba930bdeee4556709f5a1c42d88fd6>`
  713. March 18, 2015 - :cve:`2015-2317`
  714. ---------------------------------
  715. Mitigated possible XSS attack via user-supplied redirect URLs. `Full
  716. description <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
  717. Versions affected
  718. ~~~~~~~~~~~~~~~~~
  719. * Django 1.4 :commit:`(patch) <2342693b31f740a422abf7267c53b4e7bc487c1b>`
  720. * Django 1.6 :commit:`(patch) <5510f070711540aaa8d3707776cd77494e688ef9>`
  721. * Django 1.7 :commit:`(patch) <2a4113dbd532ce952308992633d802dc169a75f1>`
  722. * Django 1.8 :commit:`(patch) <770427c2896a078925abfca2317486b284d22f04>`
  723. March 18, 2015 - :cve:`2015-2316`
  724. ---------------------------------
  725. Denial-of-service possibility with ``strip_tags()``. `Full description
  726. <https://www.djangoproject.com/weblog/2015/mar/18/security-releases/>`__
  727. Versions affected
  728. ~~~~~~~~~~~~~~~~~
  729. * Django 1.6 :commit:`(patch) <b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f>`
  730. * Django 1.7 :commit:`(patch) <e63363f8e075fa8d66326ad6a1cc3391cc95cd97>`
  731. * Django 1.8 :commit:`(patch) <5447709a571cd5d95971f1d5d21d4a7edcf85bbd>`
  732. March 9, 2015 - :cve:`2015-2241`
  733. --------------------------------
  734. XSS attack via properties in ``ModelAdmin.readonly_fields``. `Full description
  735. <https://www.djangoproject.com/weblog/2015/mar/09/security-releases/>`__
  736. Versions affected
  737. ~~~~~~~~~~~~~~~~~
  738. * Django 1.7 :commit:`(patch) <d16e4e1d6f95e6f46bff53cc4fd0ab398b8e5059>`
  739. * Django 1.8 :commit:`(patch) <2654e1b93923bac55f12b4e66c5e39b16695ace5>`
  740. January 13, 2015 - :cve:`2015-0222`
  741. -----------------------------------
  742. Database denial-of-service with ``ModelMultipleChoiceField``. `Full description
  743. <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  744. Versions affected
  745. ~~~~~~~~~~~~~~~~~
  746. * Django 1.6 :commit:`(patch) <d7a06ee7e571b6dad07c0f5b519b1db02e2a476c>`
  747. * Django 1.7 :commit:`(patch) <bcfb47780ce7caecb409a9e9c1c314266e41d392>`
  748. January 13, 2015 - :cve:`2015-0221`
  749. -----------------------------------
  750. Denial-of-service attack against ``django.views.static.serve()``. `Full
  751. description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  752. Versions affected
  753. ~~~~~~~~~~~~~~~~~
  754. * Django 1.4 :commit:`(patch) <d020da6646c5142bc092247d218a3d1ce3e993f7>`
  755. * Django 1.6 :commit:`(patch) <553779c4055e8742cc832ed525b9ee34b174934f>`
  756. * Django 1.7 :commit:`(patch) <818e59a3f0fbadf6c447754d202d88df025f8f2a>`
  757. January 13, 2015 - :cve:`2015-0220`
  758. -----------------------------------
  759. Mitigated possible XSS attack via user-supplied redirect URLs. `Full
  760. description <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  761. Versions affected
  762. ~~~~~~~~~~~~~~~~~
  763. * Django 1.4 :commit:`(patch) <4c241f1b710da6419d9dca160e80b23b82db7758>`
  764. * Django 1.6 :commit:`(patch) <72e0b033662faa11bb7f516f18a132728aa0ae28>`
  765. * Django 1.7 :commit:`(patch) <de67dedc771ad2edec15c1d00c083a1a084e1e89>`
  766. January 13, 2015 - :cve:`2015-0219`
  767. -----------------------------------
  768. WSGI header spoofing via underscore/dash conflation. `Full description
  769. <https://www.djangoproject.com/weblog/2015/jan/13/security/>`__
  770. Versions affected
  771. ~~~~~~~~~~~~~~~~~
  772. * Django 1.4 :commit:`(patch) <4f6fffc1dc429f1ad428ecf8e6620739e8837450>`
  773. * Django 1.6 :commit:`(patch) <d7597b31d5c03106eeba4be14a33b32a5e25f4ee>`
  774. * Django 1.7 :commit:`(patch) <41b4bc73ee0da7b2e09f4af47fc1fd21144c710f>`
  775. August 20, 2014 - :cve:`2014-0483`
  776. ----------------------------------
  777. Data leakage via querystring manipulation in admin.
  778. `Full description <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  779. Versions affected
  780. ~~~~~~~~~~~~~~~~~
  781. * Django 1.4 :commit:`(patch) <027bd348642007617518379f8b02546abacaa6e0>`
  782. * Django 1.5 :commit:`(patch) <2a446c896e7c814661fb9c4f212b071b2a7fa446>`
  783. * Django 1.6 :commit:`(patch) <f7c494f2506250b8cb5923714360a3642ed63e0f>`
  784. * Django 1.7 :commit:`(patch) <2b31342cdf14fc20e07c43d258f1e7334ad664a6>`
  785. August 20, 2014 - :cve:`2014-0482`
  786. ----------------------------------
  787. ``RemoteUserMiddleware`` session hijacking. `Full description
  788. <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  789. Versions affected
  790. ~~~~~~~~~~~~~~~~~
  791. * Django 1.4 :commit:`(patch) <c9e3b9949cd55f090591fbdc4a114fcb8368b6d9>`
  792. * Django 1.5 :commit:`(patch) <dd68f319b365f6cb38c5a6c106faf4f6142d7d88>`
  793. * Django 1.6 :commit:`(patch) <0268b855f9eab3377f2821164ef3e66037789e09>`
  794. * Django 1.7 :commit:`(patch) <1a45d059c70385fcd6f4a3955f3b4e4cc96d0150>`
  795. August 20, 2014 - :cve:`2014-0481`
  796. ----------------------------------
  797. File upload denial of service. `Full description
  798. <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  799. Versions affected
  800. ~~~~~~~~~~~~~~~~~
  801. * Django 1.4 :commit:`(patch) <30042d475bf084c6723c6217a21598d9247a9c41>`
  802. * Django 1.5 :commit:`(patch) <26cd48e166ac4d84317c8ee6d63ac52a87e8da99>`
  803. * Django 1.6 :commit:`(patch) <dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1>`
  804. * Django 1.7 :commit:`(patch) <3123f8452cf49071be9110e277eea60ba0032216>`
  805. August 20, 2014 - :cve:`2014-0480`
  806. ----------------------------------
  807. ``reverse()`` can generate URLs pointing to other hosts. `Full description
  808. <https://www.djangoproject.com/weblog/2014/aug/20/security/>`__
  809. Versions affected
  810. ~~~~~~~~~~~~~~~~~
  811. * Django 1.4 :commit:`(patch) <c2fe73133b62a1d9e8f7a6b43966570b14618d7e>`
  812. * Django 1.5 :commit:`(patch) <45ac9d4fb087d21902469fc22643f5201d41a0cd>`
  813. * Django 1.6 :commit:`(patch) <da051da8df5e69944745072611351d4cfc6435d5>`
  814. * Django 1.7 :commit:`(patch) <bf650a2ee78c6d1f4544a875dcc777cf27fe93e9>`
  815. May 18, 2014 - :cve:`2014-3730`
  816. -------------------------------
  817. Malformed URLs from user input incorrectly validated. `Full description
  818. <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
  819. Versions affected
  820. ~~~~~~~~~~~~~~~~~
  821. * Django 1.4 :commit:`(patch) <7feb54bbae3f637ab3c4dd4831d4385964f574df>`
  822. * Django 1.5 :commit:`(patch) <ad32c218850ad40972dcef57beb460f8c979dd6d>`
  823. * Django 1.6 :commit:`(patch) <601107524523bca02376a0ddc1a06c6fdb8f22f3>`
  824. * Django 1.7 :commit:`(patch) <e7b0cace455c2da24492660636bfd48c45a19cdf>`
  825. May 18, 2014 - :cve:`2014-1418`
  826. -------------------------------
  827. Caches may be allowed to store and serve private data. `Full description
  828. <https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/>`__
  829. Versions affected
  830. ~~~~~~~~~~~~~~~~~
  831. * Django 1.4 :commit:`(patch) <28e23306aa53bbbb8fb87db85f99d970b051026c>`
  832. * Django 1.5 :commit:`(patch) <4001ec8698f577b973c5a540801d8a0bbea1205b>`
  833. * Django 1.6 :commit:`(patch) <1abcf3a808b35abae5d425ed4d44cb6e886dc769>`
  834. * Django 1.7 :commit:`(patch) <7fef18ba9e5a8b47bc24b5bb259c8bf3d3879f2a>`
  835. April 21, 2014 - :cve:`2014-0474`
  836. ---------------------------------
  837. MySQL typecasting causes unexpected query results. `Full description
  838. <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  839. Versions affected
  840. ~~~~~~~~~~~~~~~~~
  841. * Django 1.4 :commit:`(patch) <aa80f498de6d687e613860933ac58433ab71ea4b>`
  842. * Django 1.5 :commit:`(patch) <985434fb1d6bf2335bf96c6ebf91c3674f1f399f>`
  843. * Django 1.6 :commit:`(patch) <5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292>`
  844. * Django 1.7 :commit:`(patch) <34526c2f56b863c2103655a0893ac801667e86ea>`
  845. April 21, 2014 - :cve:`2014-0473`
  846. ---------------------------------
  847. Caching of anonymous pages could reveal CSRF token. `Full description
  848. <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  849. Versions affected
  850. ~~~~~~~~~~~~~~~~~
  851. * Django 1.4 :commit:`(patch) <1170f285ddd6a94a65f911a27788ba49ca08c0b0>`
  852. * Django 1.5 :commit:`(patch) <6872f42757d7ef6a97e0b6ec5db4d2615d8a2bd8>`
  853. * Django 1.6 :commit:`(patch) <d63e20942f3024f24cb8cd85a49461ba8a9b6736>`
  854. * Django 1.7 :commit:`(patch) <380545bf85cbf17fc698d136815b7691f8d023ca>`
  855. April 21, 2014 - :cve:`2014-0472`
  856. ---------------------------------
  857. Unexpected code execution using ``reverse()``. `Full description
  858. <https://www.djangoproject.com/weblog/2014/apr/21/security/>`__
  859. Versions affected
  860. ~~~~~~~~~~~~~~~~~
  861. * Django 1.4 :commit:`(patch) <c1a8c420fe4b27fb2caf5e46d23b5712fc0ac535>`
  862. * Django 1.5 :commit:`(patch) <2a5bcb69f42b84464b24b5c835dca6467b6aa7f1>`
  863. * Django 1.6 :commit:`(patch) <4352a50871e239ebcdf64eee6f0b88e714015c1b>`
  864. * Django 1.7 :commit:`(patch) <546740544d7f69254a67b06a3fc7fa0c43512958>`
  865. September 14, 2013 - :cve:`2013-1443`
  866. -------------------------------------
  867. Denial-of-service via large passwords. `Full description
  868. <https://www.djangoproject.com/weblog/2013/sep/15/security/>`__
  869. Versions affected
  870. ~~~~~~~~~~~~~~~~~
  871. * Django 1.4 :commit:`(patch <3f3d887a6844ec2db743fee64c9e53e04d39a368>` and :commit:`Python compatibility fix) <6903d1690a92aa040adfb0c8eb37cf62e4206714>`
  872. * Django 1.5 :commit:`(patch) <22b74fa09d7ccbc8c52270d648a0da7f3f0fa2bc>`
  873. September 10, 2013 - :cve:`2013-4315`
  874. -------------------------------------
  875. Directory-traversal via ``ssi`` template tag. `Full description
  876. <https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/>`__
  877. Versions affected
  878. ~~~~~~~~~~~~~~~~~
  879. * Django 1.4 :commit:`(patch) <87d2750b39f6f2d54b7047225521a44dcd37e896>`
  880. * Django 1.5 :commit:`(patch) <988b61c550d798f9a66d17ee0511fb7a9a7f33ca>`
  881. August 13, 2013 - :cve:`2013-6044`
  882. ----------------------------------
  883. Possible XSS via unvalidated URL redirect schemes. `Full description
  884. <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  885. Versions affected
  886. ~~~~~~~~~~~~~~~~~
  887. * Django 1.4 :commit:`(patch) <ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a>`
  888. * Django 1.5 :commit:`(patch) <1a274ccd6bc1afbdac80344c9b6e5810c1162b5f>`
  889. August 13, 2013 - :cve:`2013-4249`
  890. ----------------------------------
  891. XSS via admin trusting ``URLField`` values. `Full description
  892. <https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued/>`__
  893. Versions affected
  894. ~~~~~~~~~~~~~~~~~
  895. * Django 1.5 :commit:`(patch) <90363e388c61874add3f3557ee654a996ec75d78>`
  896. February 19, 2013 - :cve:`2013-0306`
  897. ------------------------------------
  898. Denial-of-service via formset ``max_num`` bypass. `Full description
  899. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  900. Versions affected
  901. ~~~~~~~~~~~~~~~~~
  902. * Django 1.3 :commit:`(patch) <d7094bbce8cb838f3b40f504f198c098ff1cf727>`
  903. * Django 1.4 :commit:`(patch) <0cc350a896f70ace18280410eb616a9197d862b0>`
  904. February 19, 2013 - :cve:`2013-0305`
  905. ------------------------------------
  906. Information leakage via admin history log. `Full description
  907. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  908. Versions affected
  909. ~~~~~~~~~~~~~~~~~
  910. * Django 1.3 :commit:`(patch) <d3a45e10c8ac8268899999129daa27652ec0da35>`
  911. * Django 1.4 :commit:`(patch) <0e7861aec73702f7933ce2a93056f7983939f0d6>`
  912. February 19, 2013 - :cve:`2013-1664` / :cve:`2013-1665`
  913. -------------------------------------------------------
  914. Entity-based attacks against Python XML libraries. `Full description
  915. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  916. Versions affected
  917. ~~~~~~~~~~~~~~~~~
  918. * Django 1.3 :commit:`(patch) <d19a27066b2247102e65412aa66917aff0091112>`
  919. * Django 1.4 :commit:`(patch) <1c60d07ba23e0350351c278ad28d0bd5aa410b40>`
  920. February 19, 2013 - No CVE
  921. --------------------------
  922. Additional hardening of ``Host`` header handling. `Full description
  923. <https://www.djangoproject.com/weblog/2013/feb/19/security/>`__
  924. Versions affected
  925. ~~~~~~~~~~~~~~~~~
  926. * Django 1.3 :commit:`(patch) <27cd872e6e36a81d0bb6f5b8765a1705fecfc253>`
  927. * Django 1.4 :commit:`(patch) <9936fdb11d0bbf0bd242f259bfb97bbf849d16f8>`
  928. December 10, 2012 - No CVE 2
  929. ----------------------------
  930. Additional hardening of redirect validation. `Full description
  931. <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  932. Versions affected
  933. ~~~~~~~~~~~~~~~~~
  934. * Django 1.3: :commit:`(patch) <1515eb46daa0897ba5ad5f0a2db8969255f1b343>`
  935. * Django 1.4: :commit:`(patch) <b2ae0a63aeec741f1e51bac9a95a27fd635f9652>`
  936. December 10, 2012 - No CVE 1
  937. ----------------------------
  938. Additional hardening of ``Host`` header handling. `Full description
  939. <https://www.djangoproject.com/weblog/2012/dec/10/security/>`__
  940. Versions affected
  941. ~~~~~~~~~~~~~~~~~
  942. * Django 1.3 :commit:`(patch) <2da4ace0bc1bc1d79bf43b368cb857f6f0cd6b1b>`
  943. * Django 1.4 :commit:`(patch) <319627c184e71ae267d6b7f000e293168c7b6e09>`
  944. October 17, 2012 - :cve:`2012-4520`
  945. -----------------------------------
  946. ``Host`` header poisoning. `Full description
  947. <https://www.djangoproject.com/weblog/2012/oct/17/security/>`__
  948. Versions affected
  949. ~~~~~~~~~~~~~~~~~
  950. * Django 1.3 :commit:`(patch) <b45c377f8f488955e0c7069cad3f3dd21910b071>`
  951. * Django 1.4 :commit:`(patch) <92d3430f12171f16f566c9050c40feefb830a4a3>`
  952. July 30, 2012 - :cve:`2012-3444`
  953. --------------------------------
  954. Denial-of-service via large image files. `Full description
  955. <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  956. Versions affected
  957. ~~~~~~~~~~~~~~~~~
  958. * Django 1.3 :commit:`(patch) <9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155>`
  959. * Django 1.4 :commit:`(patch) <da33d67181b53fe6cc737ac1220153814a1509f6>`
  960. July 30, 2012 - :cve:`2012-3443`
  961. --------------------------------
  962. Denial-of-service via compressed image files. `Full description
  963. <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  964. Versions affected
  965. ~~~~~~~~~~~~~~~~~
  966. * Django 1.3: :commit:`(patch) <b2eb4787a0fff9c9993b78be5c698e85108f3446>`
  967. * Django 1.4: :commit:`(patch) <c14f325c4eef628bc7bfd8873c3a72aeb0219141>`
  968. July 30, 2012 - :cve:`2012-3442`
  969. --------------------------------
  970. XSS via failure to validate redirect scheme. `Full description
  971. <https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/>`__
  972. Versions affected
  973. ~~~~~~~~~~~~~~~~~
  974. * Django 1.3: :commit:`(patch) <4dea4883e6c50d75f215a6b9bcbd95273f57c72d>`
  975. * Django 1.4: :commit:`(patch) <e34685034b60be1112160e76091e5aee60149fa1>`
  976. September 9, 2011 - :cve:`2011-4140`
  977. ------------------------------------
  978. Potential CSRF via ``Host`` header. `Full description
  979. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  980. Versions affected
  981. ~~~~~~~~~~~~~~~~~
  982. This notification was an advisory only, so no patches were issued.
  983. * Django 1.2
  984. * Django 1.3
  985. September 9, 2011 - :cve:`2011-4139`
  986. ------------------------------------
  987. ``Host`` header cache poisoning. `Full description
  988. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  989. Versions affected
  990. ~~~~~~~~~~~~~~~~~
  991. * Django 1.2 :commit:`(patch) <c613af4d6485586c79d692b70a9acac429f3ca9d>`
  992. * Django 1.3 :commit:`(patch) <2f7fadc38efa58ac0a8f93f936b82332a199f396>`
  993. September 9, 2011 - :cve:`2011-4138`
  994. ------------------------------------
  995. Information leakage/arbitrary request issuance via ``URLField.verify_exists``.
  996. `Full description
  997. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  998. Versions affected
  999. ~~~~~~~~~~~~~~~~~
  1000. * Django 1.2: :commit:`(patch) <7268f8af86186518821d775c530d5558fd726930>`
  1001. * Django 1.3: :commit:`(patch) <1a76dbefdfc60e2d5954c0ba614c3d054ba9c3f0>`
  1002. September 9, 2011 - :cve:`2011-4137`
  1003. ------------------------------------
  1004. Denial-of-service via ``URLField.verify_exists``. `Full description
  1005. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  1006. Versions affected
  1007. ~~~~~~~~~~~~~~~~~
  1008. * Django 1.2 :commit:`(patch) <7268f8af86186518821d775c530d5558fd726930>`
  1009. * Django 1.3 :commit:`(patch) <1a76dbefdfc60e2d5954c0ba614c3d054ba9c3f0>`
  1010. September 9, 2011 - :cve:`2011-4136`
  1011. ------------------------------------
  1012. Session manipulation when using memory-cache-backed session. `Full description
  1013. <https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/>`__
  1014. Versions affected
  1015. ~~~~~~~~~~~~~~~~~
  1016. * Django 1.2 :commit:`(patch) <ac7c3a110f906e4dfed3a17451bf7fd9fcb81296>`
  1017. * Django 1.3 :commit:`(patch) <fbe2eead2fa9d808658ca582241bcacb02618840>`
  1018. February 8, 2011 - :cve:`2011-0698`
  1019. -----------------------------------
  1020. Directory-traversal on Windows via incorrect path-separator handling. `Full
  1021. description <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  1022. Versions affected
  1023. ~~~~~~~~~~~~~~~~~
  1024. * Django 1.1 :commit:`(patch) <570a32a047ea56265646217264b0d3dab1a14dbd>`
  1025. * Django 1.2 :commit:`(patch) <194566480b15cf4e294d3f03ff587019b74044b2>`
  1026. February 8, 2011 - :cve:`2011-0697`
  1027. -----------------------------------
  1028. XSS via unsanitized names of uploaded files. `Full description
  1029. <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  1030. Versions affected
  1031. ~~~~~~~~~~~~~~~~~
  1032. * Django 1.1 :commit:`(patch) <1966786d2dde73e17f39cf340eb33fcb5d73904e>`
  1033. * Django 1.2 :commit:`(patch) <1f814a9547842dcfabdae09573055984af9d3fab>`
  1034. February 8, 2011 - :cve:`2011-0696`
  1035. -----------------------------------
  1036. CSRF via forged HTTP headers. `Full description
  1037. <https://www.djangoproject.com/weblog/2011/feb/08/security/>`__
  1038. Versions affected
  1039. ~~~~~~~~~~~~~~~~~
  1040. * Django 1.1 :commit:`(patch) <408c5c873ce1437c7eee9544ff279ecbad7e150a>`
  1041. * Django 1.2 :commit:`(patch) <818e70344e7193f6ebc73c82ed574e6ce3c91afc>`
  1042. December 22, 2010 - :cve:`2010-4535`
  1043. ------------------------------------
  1044. Denial-of-service in password-reset mechanism. `Full description
  1045. <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  1046. Versions affected
  1047. ~~~~~~~~~~~~~~~~~
  1048. * Django 1.1 :commit:`(patch) <7f8dd9cbac074389af8d8fd235bf2cb657227b9a>`
  1049. * Django 1.2 :commit:`(patch) <d5d8942a160685c403d381a279e72e09de5489a9>`
  1050. December 22, 2010 - :cve:`2010-4534`
  1051. ------------------------------------
  1052. Information leakage in administrative interface. `Full description
  1053. <https://www.djangoproject.com/weblog/2010/dec/22/security/>`__
  1054. Versions affected
  1055. ~~~~~~~~~~~~~~~~~
  1056. * Django 1.1 :commit:`(patch) <17084839fd7e267da5729f2a27753322b9d415a0>`
  1057. * Django 1.2 :commit:`(patch) <85207a245bf09fdebe486b4c7bbcb65300f2a693>`
  1058. September 8, 2010 - :cve:`2010-3082`
  1059. ------------------------------------
  1060. XSS via trusting unsafe cookie value. `Full description
  1061. <https://www.djangoproject.com/weblog/2010/sep/08/security-release/>`__
  1062. Versions affected
  1063. ~~~~~~~~~~~~~~~~~
  1064. * Django 1.2 :commit:`(patch) <7f84657b6b2243cc787bdb9f296710c8d13ad0bd>`
  1065. October 9, 2009 - :cve:`2009-3965`
  1066. ----------------------------------
  1067. Denial-of-service via pathological regular expression performance. `Full
  1068. description <https://www.djangoproject.com/weblog/2009/oct/09/security/>`__
  1069. Versions affected
  1070. ~~~~~~~~~~~~~~~~~
  1071. * Django 1.0 :commit:`(patch) <594a28a9044120bed58671dde8a805c9e0f6c79a>`
  1072. * Django 1.1 :commit:`(patch) <e3e992e18b368fcd56aabafc1b5bf80a6e11b495>`
  1073. July 28, 2009 - :cve:`2009-2659`
  1074. --------------------------------
  1075. Directory-traversal in development server media handler. `Full description
  1076. <https://www.djangoproject.com/weblog/2009/jul/28/security/>`__
  1077. Versions affected
  1078. ~~~~~~~~~~~~~~~~~
  1079. * Django 0.96 :commit:`(patch) <da85d76fd6ca846f3b0ff414e042ddb5e62e2e69>`
  1080. * Django 1.0 :commit:`(patch) <df7f917b7f51ba969faa49d000ffc79572c5dcb4>`
  1081. September 2, 2008 - :cve:`2008-3909`
  1082. ------------------------------------
  1083. CSRF via preservation of POST data during admin login. `Full description
  1084. <https://www.djangoproject.com/weblog/2008/sep/02/security/>`__
  1085. Versions affected
  1086. ~~~~~~~~~~~~~~~~~
  1087. * Django 0.91 :commit:`(patch) <44debfeaa4473bd28872c735dd3d9afde6886752>`
  1088. * Django 0.95 :commit:`(patch) <aee48854a164382c655acb9f18b3c06c3d238e81>`
  1089. * Django 0.96 :commit:`(patch) <7e0972bded362bc4b851c109df2c8a6548481a8e>`
  1090. May 14, 2008 - :cve:`2008-2302`
  1091. -------------------------------
  1092. XSS via admin login redirect. `Full description
  1093. <https://www.djangoproject.com/weblog/2008/may/14/security/>`__
  1094. Versions affected
  1095. ~~~~~~~~~~~~~~~~~
  1096. * Django 0.91 :commit:`(patch) <6e657e2c404a96e744748209e896d8a69c15fdf2>`
  1097. * Django 0.95 :commit:`(patch) <50ce7fb57d79e8940ccf6e2781f2f01df029b5c5>`
  1098. * Django 0.96 :commit:`(patch) <7791e5c050cebf86d868c5dab7092185b125fdc9>`
  1099. October 26, 2007 - :cve:`2007-5712`
  1100. -----------------------------------
  1101. Denial-of-service via arbitrarily-large ``Accept-Language`` header. `Full
  1102. description <https://www.djangoproject.com/weblog/2007/oct/26/security-fix/>`__
  1103. Versions affected
  1104. ~~~~~~~~~~~~~~~~~
  1105. * Django 0.91 :commit:`(patch) <8bc36e726c9e8c75c681d3ad232df8e882aaac81>`
  1106. * Django 0.95 :commit:`(patch) <412ed22502e11c50dbfee854627594f0e7e2c234>`
  1107. * Django 0.96 :commit:`(patch) <7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f>`
  1108. Issues prior to Django's security process
  1109. =========================================
  1110. Some security issues were handled before Django had a formalized
  1111. security process in use. For these, new releases may not have been
  1112. issued at the time and CVEs may not have been assigned.
  1113. January 21, 2007 - :cve:`2007-0405`
  1114. -----------------------------------
  1115. Apparent "caching" of authenticated user. `Full description
  1116. <https://www.djangoproject.com/weblog/2007/jan/21/0951/>`__
  1117. Versions affected
  1118. ~~~~~~~~~~~~~~~~~
  1119. * Django 0.95 :commit:`(patch) <e89f0a65581f82a5740bfe989136cea75d09cd67>`
  1120. August 16, 2006 - :cve:`2007-0404`
  1121. ----------------------------------
  1122. Filename validation issue in translation framework. `Full description
  1123. <https://www.djangoproject.com/weblog/2006/aug/16/compilemessages/>`__
  1124. Versions affected
  1125. ~~~~~~~~~~~~~~~~~
  1126. * Django 0.90 :commit:`(patch) <6eefa521be3c658dc0b38f8d62d52e9801e198ab>`
  1127. * Django 0.91 :commit:`(patch) <d31e39173c29537e6a1613278c93634c18a3206e>`
  1128. * Django 0.95 :commit:`(patch) <a132d411c6986418ee6c0edc331080aa792fee6e>`
  1129. (released January 21 2007)