Python/django/1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD
28 Security Vulnerabilities
Django Allows Arbitrary URL Generation
- https://nvd.nist.gov/vuln/detail/CVE-2012-4520
- https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
- https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
- https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
- https://bugzilla.redhat.com/show_bug.cgi?id=865164
- https://www.djangoproject.com/weblog/2012/oct/17/security/
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
- https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
- https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
- https://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
- https://ubuntu.com/usn/usn-1632-1
- https://ubuntu.com/usn/usn-1757-1
- https://web.archive.org/web/20140417023920/http://securitytracker.com/id?1027708
- https://www.debian.org/security/2013/dsa-2634
- https://www.openwall.com/lists/oss-security/2012/10/30/4
- https://github.com/advisories/GHSA-2655-q453-22f9
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-7.yaml
- https://www.djangoproject.com/weblog/2012/oct/17/security
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
- http://ubuntu.com/usn/usn-1632-1
- http://ubuntu.com/usn/usn-1757-1
- http://www.debian.org/security/2013/dsa-2634
- http://www.openwall.com/lists/oss-security/2012/10/30/4
The django.http.HttpRequest.get_host
function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
Django denial of service via file upload naming
- https://nvd.nist.gov/vuln/detail/CVE-2014-0481
- https://www.djangoproject.com/weblog/2014/aug/20/security/
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
- http://www.debian.org/security/2014/dsa-3010
- https://github.com/django/django/commit/26cd48e166ac4d84317c8ee6d63ac52a87e8da99
- https://github.com/django/django/commit/30042d475bf084c6723c6217a21598d9247a9c41
- https://github.com/django/django/commit/dd0c3f4ee1a30c1a1e6055061c6ba6e58c6b54d1
- https://github.com/advisories/GHSA-296w-6qhq-gf92
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-5.yaml
- https://www.djangoproject.com/weblog/2014/aug/20/security
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
Improper Input Validation in Django
- https://nvd.nist.gov/vuln/detail/CVE-2019-3498
- https://github.com/advisories/GHSA-337x-4q8g-prc5
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ
- https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
- https://usn.ubuntu.com/3851-1/
- https://www.debian.org/security/2019/dsa-4363
- https://www.djangoproject.com/weblog/2019/jan/04/security-releases/
- http://www.securityfocus.com/bid/106453
- https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found()
, leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
Denial of service in django
- https://nvd.nist.gov/vuln/detail/CVE-2011-4137
- https://github.com/advisories/GHSA-3jqw-crqj-w8qw
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- https://hermes.opensuse.org/messages/14700881
- https://www.djangoproject.com/weblog/2011/sep/09/
- https://www.djangoproject.com/weblog/2011/sep/10/127/
- http://openwall.com/lists/oss-security/2011/09/11/1
- http://openwall.com/lists/oss-security/2011/09/13/2
- http://openwall.com/lists/oss-security/2011/09/15/5
- http://secunia.com/advisories/46614
- http://www.debian.org/security/2011/dsa-2332
- https://github.com/django/django/commit/1a76dbefdfc60e2d5954c0ba614c3d054ba9c3f0
- https://github.com/django/django/commit/7268f8af86186518821d775c530d5558fd726930
- https://www.djangoproject.com/weblog/2011/sep/09
- https://www.djangoproject.com/weblog/2011/sep/10/127
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
Django Image Field Vulnerable to Image Decompression Bombs
- https://nvd.nist.gov/vuln/detail/CVE-2012-3443
- https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
- https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155
- https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6
- https://www.debian.org/security/2012/dsa-2529
- https://www.mandriva.com/security/advisories?name=MDVSA-2012:143
- https://www.openwall.com/lists/oss-security/2012/07/31/1
- https://www.openwall.com/lists/oss-security/2012/07/31/2
- https://www.ubuntu.com/usn/USN-1560-1
- https://github.com/advisories/GHSA-59w8-4wm2-4xw8
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-3.yaml
- https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
- http://www.debian.org/security/2012/dsa-2529
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
- http://www.openwall.com/lists/oss-security/2012/07/31/1
- http://www.openwall.com/lists/oss-security/2012/07/31/2
- http://www.ubuntu.com/usn/USN-1560-1
The django.forms.ImageField
class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
Django Middleware Enables Session Hijacking
- https://nvd.nist.gov/vuln/detail/CVE-2014-0482
- https://www.djangoproject.com/weblog/2014/aug/20/security/
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
- http://www.debian.org/security/2014/dsa-3010
- https://github.com/django/django/commit/0268b855f9eab3377f2821164ef3e66037789e09
- https://github.com/django/django/commit/5307ce565fbedb9cc27cbe7c757b41a00438d37c
- https://github.com/django/django/commit/c9e3b9949cd55f090591fbdc4a114fcb8368b6d9
- https://github.com/django/django/commit/dd68f319b365f6cb38c5a6c106faf4f6142d7d88
- https://github.com/django/django/blob/aa3cb3f37265be37d892e2b391ff023e9caee2a4/docs/releases/1.5.9.txt#L42
- https://github.com/advisories/GHSA-625g-gx8c-xcmg
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-6.yaml
- https://www.djangoproject.com/weblog/2014/aug/20/security
The contrib.auth.middleware.RemoteUserMiddleware
middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend
backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER
header.
Django Cross-site Scripting Vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2015-2241
- https://code.djangoproject.com/ticket/24461
- https://www.djangoproject.com/weblog/2015/mar/09/security-releases/
- https://github.com/django/django/commit/2654e1b93923bac55f12b4e66c5e39b16695ace5
- https://github.com/django/django/commit/82c9169077a066995e3b00aac551bf1c8a89d98a
- https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
- https://web.archive.org/web/20171112005349/http://www.securityfocus.com/bid/73095
- https://github.com/advisories/GHSA-6565-fg86-6jcx
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-8.yaml
- https://www.djangoproject.com/weblog/2015/mar/09/security-releases
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py
in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields
, as demonstrated by an @property
.
Path Traversal in Django
- https://nvd.nist.gov/vuln/detail/CVE-2021-33203
- https://github.com/advisories/GHSA-68w8-qjq3-2gfm
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
- https://security.netapp.com/advisory/ntap-20210727-0004/
- https://github.com/django/django/commit/053cc9534d174dc89daba36724ed2dcb36755b90
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
- https://github.com/django/django/commit/20c67a0693c4ede2b09af02574823485e82e4c8f
- https://github.com/django/django/commit/dfaba12cda060b8b292ae1d271b44bf810b1c5b9
- https://docs.djangoproject.com/en/3.2/releases/security
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-98.yaml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
- https://security.netapp.com/advisory/ntap-20210727-0004
- https://www.djangoproject.com/weblog/2021/jun/02/security-releases
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
Django Allows Redirect via Data URL
- https://nvd.nist.gov/vuln/detail/CVE-2012-3442
- https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
- http://www.debian.org/security/2012/dsa-2529
- http://www.openwall.com/lists/oss-security/2012/07/31/1
- http://www.openwall.com/lists/oss-security/2012/07/31/2
- http://www.ubuntu.com/usn/USN-1560-1
- https://github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d
- https://github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1
- https://github.com/advisories/GHSA-78vx-ggch-wghm
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-2.yaml
- https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:143
The (1) django.http.HttpResponseRedirect
and (2) django.http.HttpResponsePermanentRedirect
classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data:
URL.
Django WSGI Header Spoofing Vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2015-0219
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://www.ubuntu.com/usn/USN-2469-1
- https://github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f
- https://github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450
- https://github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee
- https://github.com/django/daphne/blob/e49c39a4e5fac8ec170dd653641a9e90844fd3f1/daphne/http_protocol.py#L151
- https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
- https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
- https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
- https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
- https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
- https://github.com/advisories/GHSA-7qfw-j7hp-v45g
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-4.yaml
- https://www.djangoproject.com/weblog/2015/jan/13/security
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _
(underscore) character instead of a -
(dash) character in an HTTP header, as demonstrated by an X-Auth_User
header.
Django Reuses Cached CSRF Token
- https://nvd.nist.gov/vuln/detail/CVE-2014-0473
- https://www.djangoproject.com/weblog/2014/apr/21/security/
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
- http://rhn.redhat.com/errata/RHSA-2014-0456.html
- http://rhn.redhat.com/errata/RHSA-2014-0457.html
- http://www.debian.org/security/2014/dsa-2934
- http://www.ubuntu.com/usn/USN-2169-1
- https://github.com/advisories/GHSA-89hj-xfx5-7q66
- https://github.com/django/django/commit/1170f285ddd6a94a65f911a27788ba49ca08c0b0
- https://github.com/django/django/commit/6872f42757d7ef6a97e0b6ec5db4d2615d8a2bd8
- https://github.com/django/django/commit/d63e20942f3024f24cb8cd85a49461ba8a9b6736
- https://www.djangoproject.com/weblog/2014/apr/21/security
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-2.yaml
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
Django Cross-site scripting Vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2016-6186
- https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158
- https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/
- https://www.djangoproject.com/weblog/2016/jul/18/security-releases/
- https://www.exploit-db.com/exploits/40129/
- http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html
- http://rhn.redhat.com/errata/RHSA-2016-1594.html
- http://rhn.redhat.com/errata/RHSA-2016-1595.html
- http://rhn.redhat.com/errata/RHSA-2016-1596.html
- http://seclists.org/fulldisclosure/2016/Jul/53
- http://www.debian.org/security/2016/dsa-3622
- http://www.ubuntu.com/usn/USN-3039-1
- http://www.vulnerability-lab.com/get_content.php?id=1869
- https://web.archive.org/web/20201022155237/http://www.securityfocus.com/archive/1/538947/100/0/threaded
- https://web.archive.org/web/20210123154652/http://www.securityfocus.com/bid/92058
- https://web.archive.org/web/20211204042848/http://www.securitytracker.com/id/1036338
- https://github.com/advisories/GHSA-c8c8-9472-w52h
- https://github.com/django/django/commit/6fa150b2f8b601668083042324c4add534143cb1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW
- https://www.djangoproject.com/weblog/2016/jul/18/security-releases
- https://www.exploit-db.com/exploits/40129
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-2.yaml
Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup
function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js
in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
Django CSRF Protection Bypass
- https://nvd.nist.gov/vuln/detail/CVE-2016-7401
- https://www.djangoproject.com/weblog/2016/sep/26/security-releases/
- http://rhn.redhat.com/errata/RHSA-2016-2038.html
- http://rhn.redhat.com/errata/RHSA-2016-2039.html
- http://rhn.redhat.com/errata/RHSA-2016-2040.html
- http://rhn.redhat.com/errata/RHSA-2016-2041.html
- http://rhn.redhat.com/errata/RHSA-2016-2042.html
- http://rhn.redhat.com/errata/RHSA-2016-2043.html
- http://www.debian.org/security/2016/dsa-3678
- http://www.ubuntu.com/usn/USN-3089-1
- https://web.archive.org/web/20200227223637/http://www.securityfocus.com/bid/93182
- https://web.archive.org/web/20210927195154/http://www.securitytracker.com/id/1036899
- https://github.com/advisories/GHSA-crhm-qpjc-cm64
- https://github.com/django/django/commit/6fe846a8f08dc959003f298b5407e321c6fe3735
- https://github.com/django/django/commit/6118ab7d0676f0d622278e5be215f14fb5410b6a
- https://github.com/django/django/commit/d1bc980db1c0fffd6d60677e62f70beadb9fe64a
- https://www.djangoproject.com/weblog/2016/sep/26/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-3.yaml
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
Django Incorrectly Validates URLs
- https://nvd.nist.gov/vuln/detail/CVE-2014-0480
- https://www.djangoproject.com/weblog/2014/aug/20/security/
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
- http://www.debian.org/security/2014/dsa-3010
- https://github.com/django/django/commit/45ac9d4fb087d21902469fc22643f5201d41a0cd
- https://github.com/django/django/commit/c2fe73133b62a1d9e8f7a6b43966570b14618d7e
- https://github.com/django/django/commit/da051da8df5e69944745072611351d4cfc6435d5
- https://web.archive.org/web/20140918034351/http://www.securityfocus.com/bid/69425
- https://github.com/advisories/GHSA-f7cm-ccfp-3q4r
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-4.yaml
- https://www.djangoproject.com/weblog/2014/aug/20/security
The core.urlresolvers.reverse
function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a //
(slash slash) in a URL, which triggers a scheme-relative URL to be generated.
Django User Enumeration Vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2016-2513
- https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
- http://rhn.redhat.com/errata/RHSA-2016-0502.html
- http://rhn.redhat.com/errata/RHSA-2016-0504.html
- http://rhn.redhat.com/errata/RHSA-2016-0505.html
- http://rhn.redhat.com/errata/RHSA-2016-0506.html
- http://www.debian.org/security/2016/dsa-3544
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/83878
- http://www.securitytracker.com/id/1035152
- http://www.ubuntu.com/usn/USN-2915-1
- http://www.ubuntu.com/usn/USN-2915-2
- http://www.ubuntu.com/usn/USN-2915-3
- https://github.com/advisories/GHSA-fp6p-5xvw-m74f
- https://web.archive.org/web/20160322001143/http://www.securitytracker.com/id/1035152
- https://web.archive.org/web/20200228001222/http://www.securityfocus.com/bid/83878
- https://github.com/django/django/commit/af7d09b0c5c6ab68e629fd9baf736f9dd203b18e
- https://github.com/django/django/commit/f4e6e02f7713a6924d16540be279909ff4091eb6
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-16.yaml
The password hasher in contrib/auth/hashers.py
in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
Django is vulnerable to Denial of Service attack in formset
- https://nvd.nist.gov/vuln/detail/CVE-2013-0306
- https://www.djangoproject.com/weblog/2013/feb/19/security/
- http://rhn.redhat.com/errata/RHSA-2013-0670.html
- http://ubuntu.com/usn/usn-1757-1
- http://www.debian.org/security/2013/dsa-2634
- https://github.com/django/django/commit/0cc350a896f70ace18280410eb616a9197d862b0
- https://github.com/django/django/commit/d7094bbce8cb838f3b40f504f198c098ff1cf727
- https://github.com/advisories/GHSA-g8xg-jgj6-49r3
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
Django Cross-site Scripting Vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2015-0220
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://ubuntu.com/usn/usn-2469-1
- https://github.com/django/django/commit/4c241f1b710da6419d9dca160e80b23b82db7758
- https://github.com/django/django/commit/72e0b033662faa11bb7f516f18a132728aa0ae28
- https://github.com/django/django/commit/de67dedc771ad2edec15c1d00c083a1a084e1e89
- https://github.com/django/django/blob/4555a823fd57e261e1b19c778429473256c8ea08/docs/releases/1.4.18.txt#L34-L46
- https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
- https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
- https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
- https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
- https://github.com/advisories/GHSA-gv98-g628-m9x5
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-5.yaml
- https://www.djangoproject.com/weblog/2015/jan/13/security
The django.util.http.is_safe_url
function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \njavascript:
URL.
Django Denial-of-service by filling session store
- https://nvd.nist.gov/vuln/detail/CVE-2015-5143
- https://github.com/advisories/GHSA-h582-2pch-3xv3
- https://security.gentoo.org/glsa/201510-06
- https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html
- http://rhn.redhat.com/errata/RHSA-2015-1678.html
- http://rhn.redhat.com/errata/RHSA-2015-1686.html
- http://www.debian.org/security/2015/dsa-3305
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/75666
- http://www.securitytracker.com/id/1032820
- http://www.ubuntu.com/usn/USN-2671-1
- https://github.com/django/django/commit/1828f4341ec53a8684112d24031b767eba557663
- https://github.com/django/django/commit/2e47f3e401c29bc2ba5ab794d483cb0820855fb9
- https://github.com/django/django/commit/66d12d1ababa8f062857ee5eb43276493720bf16
- https://www.djangoproject.com/weblog/2015/jul/08/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-20.yaml
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
Moderate severity vulnerability that affects django
- https://nvd.nist.gov/vuln/detail/CVE-2011-4140
- https://github.com/advisories/GHSA-h95j-h2rv-qrg4
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- https://hermes.opensuse.org/messages/14700881
- https://www.djangoproject.com/weblog/2011/sep/09/
- https://www.djangoproject.com/weblog/2011/sep/10/127/
- http://openwall.com/lists/oss-security/2011/09/11/1
- http://openwall.com/lists/oss-security/2011/09/13/2
- http://secunia.com/advisories/46614
- http://www.debian.org/security/2011/dsa-2332
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
SQL injection in Django
- https://nvd.nist.gov/vuln/detail/CVE-2020-7471
- https://github.com/advisories/GHSA-hmr4-m2h5-33qx
- https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136
- https://docs.djangoproject.com/en/3.0/releases/security/
- https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI
- https://www.djangoproject.com/weblog/2020/feb/03/security-releases/
- https://www.openwall.com/lists/oss-security/2020/02/03/1
- http://www.openwall.com/lists/oss-security/2020/02/03/1
- https://usn.ubuntu.com/4264-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
- https://seclists.org/bugtraq/2020/Feb/30
- https://security.gentoo.org/glsa/202004-17
- https://security.netapp.com/advisory/ntap-20200221-0006/
- https://www.debian.org/security/2020/dsa-4629
- https://github.com/django/django/commit/001b0634cd309e372edb6d7d95d083d02b8e37bd
- https://github.com/django/django/commit/505826b469b16ab36693360da9e11fd13213421b
- https://github.com/django/django/commit/c67a368c16e4680b324b4f385398d638db4d8147
- https://www.djangoproject.com/weblog/2020/feb/03/security-releases
- https://usn.ubuntu.com/4264-1
- https://security.netapp.com/advisory/ntap-20200221-0006
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-35.yaml
- https://docs.djangoproject.com/en/3.0/releases/security
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
Django DoS in django.views.static.serve
- https://nvd.nist.gov/vuln/detail/CVE-2015-0221
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://ubuntu.com/usn/usn-2469-1
- https://github.com/django/django/commit/553779c4055e8742cc832ed525b9ee34b174934f
- https://github.com/django/django/commit/818e59a3f0fbadf6c447754d202d88df025f8f2a
- https://github.com/django/django/commit/d020da6646c5142bc092247d218a3d1ce3e993f7
- https://github.com/django/django/blob/9b9c805cedb08621bd5dc58a01a6478eb7cc49a9/docs/releases/1.4.18.txt#L48C1-L49C1
- https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
- https://web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
- https://web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
- https://web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
- https://web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
- https://github.com/advisories/GHSA-jhjg-w2cp-5j44
- https://www.djangoproject.com/weblog/2015/jan/13/security
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-6.yaml
The django.views.static.serve
view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
Django XSS Vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2016-2512
- https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
- http://rhn.redhat.com/errata/RHSA-2016-0502.html
- http://rhn.redhat.com/errata/RHSA-2016-0504.html
- http://rhn.redhat.com/errata/RHSA-2016-0505.html
- http://rhn.redhat.com/errata/RHSA-2016-0506.html
- http://www.debian.org/security/2016/dsa-3544
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.ubuntu.com/usn/USN-2915-1
- http://www.ubuntu.com/usn/USN-2915-2
- http://www.ubuntu.com/usn/USN-2915-3
- https://web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879
- https://web.archive.org/web/20210413200202/http://www.securitytracker.com/id/1035152
- https://github.com/advisories/GHSA-pw27-w7w4-9qc7
- https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350
- https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380
- https://www.djangoproject.com/weblog/2016/mar/01/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-15.yaml
The utils.http.is_safe_url function
in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com
.
Django Vulnerable to HTTP Response Splitting Attack
- https://nvd.nist.gov/vuln/detail/CVE-2015-5144
- https://security.gentoo.org/glsa/201510-06
- https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html
- http://www.debian.org/security/2015/dsa-3305
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.ubuntu.com/usn/USN-2671-1
- https://github.com/django/django/commit/1ba1cdce7d58e6740fe51955d945b56ae51d072a
- https://github.com/django/django/commit/574dd5e0b0fbb877ae5827b1603d298edc9bb2a0
- https://github.com/django/django/commit/ae49b4d994656bc037513dcd064cb9ce5bb85649
- https://github.com/django/django/blob/4555a823fd57e261e1b19c778429473256c8ea08/docs/releases/1.4.21.txt#L30-L54
- https://web.archive.org/web/20150924150801/http://www.securitytracker.com/id/1032820
- https://web.archive.org/web/20200228050526/http://www.securityfocus.com/bid/75665
- https://github.com/advisories/GHSA-q5qw-4364-5hhm
- https://github.com/django/django/commit/8f9a4d3a2bc42f14bb437defd30c7315adbff22c
- https://www.djangoproject.com/weblog/2015/jul/08/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-10.yaml
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validateipv4address or (4) validate_slug validator.
Django Data leakage via admin history log
- https://nvd.nist.gov/vuln/detail/CVE-2013-0305
- https://www.djangoproject.com/weblog/2013/feb/19/security/
- http://rhn.redhat.com/errata/RHSA-2013-0670.html
- http://ubuntu.com/usn/usn-1757-1
- http://www.debian.org/security/2013/dsa-2634
- https://github.com/django/django/commit/0e7861aec73702f7933ce2a93056f7983939f0d6
- https://github.com/django/django/commit/d3a45e10c8ac8268899999129daa27652ec0da35
- https://github.com/advisories/GHSA-r7w6-p47g-vj53
The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.
Django Potential account hijack via password reset form
- https://nvd.nist.gov/vuln/detail/CVE-2019-19844
- https://github.com/advisories/GHSA-vfq6-hq5r-27r6
- https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70
- https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0
- https://seclists.org/bugtraq/2020/Jan/9
- https://security.netapp.com/advisory/ntap-20200110-0003/
- https://usn.ubuntu.com/4224-1/
- https://www.debian.org/security/2020/dsa-4598
- https://www.djangoproject.com/weblog/2019/dec/18/security-releases/
- http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/
- https://security.gentoo.org/glsa/202004-17
- https://github.com/django/django/commit/302a4ff1e8b1c798aab97673909c7a3dfda42c26
- https://github.com/django/django/commit/4d334bea06cac63dc1272abcec545b85136cca0e
- https://docs.djangoproject.com/en/dev/releases/security
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2019-16.yaml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD
- https://security.netapp.com/advisory/ntap-20200110-0003
- https://usn.ubuntu.com/4224-1
- https://www.djangoproject.com/weblog/2019/dec/18/security-releases
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Uncontrolled Memory Consumption in Django
- https://nvd.nist.gov/vuln/detail/CVE-2019-6975
- https://github.com/advisories/GHSA-wh4h-v3f2-r2pp
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
- https://seclists.org/bugtraq/2019/Jul/10
- https://usn.ubuntu.com/3890-1/
- https://www.debian.org/security/2019/dsa-4476
- https://www.djangoproject.com/weblog/2019/feb/11/security-releases/
- https://www.openwall.com/lists/oss-security/2019/02/11/1
- http://www.securityfocus.com/bid/106964
- https://github.com/django/django/commit/0bbb560183fabf0533289700845dafa94951f227
- https://github.com/django/django/commit/1f42f82566c9d2d73aff1c42790d6b1b243f7676
- https://github.com/django/django/commit/40cd19055773705301c3428ed5e08a036d2091f3
- https://web.archive.org/web/20200227084713/http://www.securityfocus.com/bid/106964
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format()
function.
Django Vulnerable to MySQL Injection
- https://nvd.nist.gov/vuln/detail/CVE-2014-0474
- https://www.djangoproject.com/weblog/2014/apr/21/security/
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
- http://rhn.redhat.com/errata/RHSA-2014-0456.html
- http://rhn.redhat.com/errata/RHSA-2014-0457.html
- http://www.debian.org/security/2014/dsa-2934
- http://www.ubuntu.com/usn/USN-2169-1
- https://github.com/django/django/commit/5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292
- https://github.com/django/django/commit/985434fb1d6bf2335bf96c6ebf91c3674f1f399f
- https://github.com/django/django/commit/aa80f498de6d687e613860933ac58433ab71ea4b
- https://github.com/advisories/GHSA-wqjj-hx84-v449
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-3.yaml
- https://www.djangoproject.com/weblog/2014/apr/21/security
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to MySQL typecasting.
Session manipulation in Django
- https://nvd.nist.gov/vuln/detail/CVE-2011-4136
- https://github.com/advisories/GHSA-x88j-93vc-wpmp
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- https://hermes.opensuse.org/messages/14700881
- https://www.djangoproject.com/weblog/2011/sep/09/
- https://www.djangoproject.com/weblog/2011/sep/10/127/
- http://openwall.com/lists/oss-security/2011/09/11/1
- http://openwall.com/lists/oss-security/2011/09/13/2
- http://secunia.com/advisories/46614
- http://www.debian.org/security/2011/dsa-2332
- https://github.com/django/django/commit/ac7c3a110f906e4dfed3a17451bf7fd9fcb81296
- https://github.com/django/django/commit/fbe2eead2fa9d808658ca582241bcacb02618840
- https://www.djangoproject.com/weblog/2011/sep/09
- https://www.djangoproject.com/weblog/2011/sep/10/127
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.