First published: Wed Apr 23 2014(Updated: )
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Django | =1.5 | |
Djangoproject Django | =1.5.1 | |
Djangoproject Django | =1.5.2 | |
Djangoproject Django | =1.5.3 | |
Djangoproject Django | =1.5.4 | |
Djangoproject Django | =1.5.5 | |
Djangoproject Django | =1.6 | |
Djangoproject Django | =1.6.1 | |
Djangoproject Django | =1.6.2 | |
Djangoproject Django | =1.7-alpha1 | |
Djangoproject Django | =1.7-alpha2 | |
Djangoproject Django | =1.7-beta1 | |
Djangoproject Django | <=1.4.10 | |
Djangoproject Django | =1.4 | |
Djangoproject Django | =1.4.1 | |
Djangoproject Django | =1.4.2 | |
Djangoproject Django | =1.4.3 | |
Djangoproject Django | =1.4.4 | |
Djangoproject Django | =1.4.5 | |
Djangoproject Django | =1.4.6 | |
Djangoproject Django | =1.4.7 | |
Djangoproject Django | =1.4.8 | |
Djangoproject Django | =1.4.9 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.10 | |
Canonical Ubuntu Linux | =14.04 | |
pip/Django | >=1.6<1.6.3 | 1.6.3 |
pip/Django | >=1.5<1.5.6 | 1.5.6 |
pip/django | <1.4.11 | 1.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.