Safety vulnerability ID: 35515
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Django 1.4.14, 1.5.9, 1.6.6 and 1.7rc3 include a fix for CVE-2014-0482: The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
CONFIRM:https://www.djangoproject.com/weblog/2014/aug/20/security/: https://www.djangoproject.com/weblog/2014/aug/20/security/
DEBIAN:DSA-3010: http://www.debian.org/security/2014/dsa-3010
SUSE:openSUSE-SU-2014:1132: http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
SECUNIA:59782: http://secunia.com/advisories/59782
SECUNIA:61276: http://secunia.com/advisories/61276
SECUNIA:61281: http://secunia.com/advisories/61281
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application