Safety vulnerability ID: 35511
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Django 1.4.11, 1.5.6, 1.6.3 and 1.7b2 include a fix for CVE-2014-0473: The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
https://www.djangoproject.com/weblog/2014/apr/21/security
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
CONFIRM:https://www.djangoproject.com/weblog/2014/apr/21/security/: https://www.djangoproject.com/weblog/2014/apr/21/security/
DEBIAN:DSA-2934: http://www.debian.org/security/2014/dsa-2934
REDHAT:RHSA-2014:0456: http://rhn.redhat.com/errata/RHSA-2014-0456.html
REDHAT:RHSA-2014:0457: http://rhn.redhat.com/errata/RHSA-2014-0457.html
SUSE:openSUSE-SU-2014:1132: http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
UBUNTU:USN-2169-1: http://www.ubuntu.com/usn/USN-2169-1
SECUNIA:61281: http://secunia.com/advisories/61281
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application