First published: Fri Aug 05 2016(Updated: )
Cross-site scripting (XSS) vulnerability in the `dismissChangeRelatedObjectPopup` function in `contrib/admin/static/admin/js/admin/RelatedObjectLookups.js` in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
Djangoproject Django | <=1.8.13 | |
Djangoproject Django | =1.9 | |
Djangoproject Django | =1.9.0-rc1 | |
Djangoproject Django | =1.9.1 | |
Djangoproject Django | =1.9.2 | |
Djangoproject Django | =1.9.3 | |
Djangoproject Django | =1.9.4 | |
Djangoproject Django | =1.9.5 | |
Djangoproject Django | =1.9.6 | |
Djangoproject Django | =1.9.7 | |
Djangoproject Django | =1.10-alpha1 | |
Djangoproject Django | =1.10-beta1 | |
pip/django | >=1.10a1<1.10rc1 | 1.10rc1 |
pip/django | >=1.9<1.9.8 | 1.9.8 |
pip/django | <1.8.14 | 1.8.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.