First published: Mon Oct 03 2016(Updated: )
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Djangoproject Django | <=1.8.14 | |
Djangoproject Django | =1.9.0 | |
Djangoproject Django | =1.9.1 | |
Djangoproject Django | =1.9.2 | |
Djangoproject Django | =1.9.3 | |
Djangoproject Django | =1.9.4 | |
Djangoproject Django | =1.9.5 | |
Djangoproject Django | =1.9.6 | |
Djangoproject Django | =1.9.7 | |
Djangoproject Django | =1.9.8 | |
Djangoproject Django | =1.9.9 | |
Debian Debian Linux | =8.0 | |
pip/django | >=1.9<1.9.10 | 1.9.10 |
pip/django | <1.8.15 | 1.8.15 |
=12.04 | ||
=14.04 | ||
=16.04 | ||
<=1.8.14 | ||
=1.9.0 | ||
=1.9.1 | ||
=1.9.2 | ||
=1.9.3 | ||
=1.9.4 | ||
=1.9.5 | ||
=1.9.6 | ||
=1.9.7 | ||
=1.9.8 | ||
=1.9.9 | ||
=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.