Django’s development team is strongly committed to responsible reporting and disclosure of security-related issues, as outlined in Django’s security policies.
As part of that commitment, we maintain the following historical list of issues which have been fixed and disclosed. For each issue, the list below includes the date, a brief description, the CVE identifier if applicable, a list of affected versions, a link to the full disclosure and links to the appropriate patch(es).
Quelques mises en garde importantes applicables à ces informations
Some security issues were handled before Django had a formalized security process in use. For these, new releases may not have been issued at the time and CVEs may not have been assigned.
Filename validation issue in translation framework. Full description
Django 0.90 (correctif)
Django 0.91 (correctif)
Django 0.95 (correctif) (released January 21 2007)
Apparent “caching” of authenticated user. Full description
Django 0.95 (correctif)
Toutes les autres issues ont été traités dans le cadre du processus de sécurité de Django. Elles sont listées ci-dessous.
Denial-of-service via arbitrarily-large Accept-Language
header. Full
description
Django 0.91 (correctif)
Django 0.95 (correctif)
Django 0.96 (correctif)
XSS via admin login redirect. Full description
Django 0.91 (correctif)
Django 0.95 (correctif)
Django 0.96 (correctif)
CSRF via preservation of POST data during admin login. Full description
Django 0.91 (correctif)
Django 0.95 (correctif)
Django 0.96 (correctif)
Directory-traversal in development server media handler. Full description
Django 0.96 (correctif)
Django 1.0 (correctif)
Denial-of-service via pathological regular expression performance. Full description
Django 1.0 (correctif)
Django 1.1 (correctif)
XSS via trusting unsafe cookie value. Full description
Django 1.2 (correctif)
Information leakage in administrative interface. Full description
Django 1.1 (correctif)
Django 1.2 (correctif)
Denial-of-service in password-reset mechanism. Full description
Django 1.1 (correctif)
Django 1.2 (correctif)
CSRF via forged HTTP headers. Full description
Django 1.1 (correctif)
Django 1.2 (correctif)
XSS via unsanitized names of uploaded files. Full description
Django 1.1 (correctif)
Django 1.2 (correctif)
Directory-traversal on Windows via incorrect path-separator handling. Full description
Django 1.1 (correctif)
Django 1.2 (correctif)
Session manipulation when using memory-cache-backed session. Full description
Django 1.2 (correctif)
Django 1.3 (correctif)
Denial-of-service via URLField.verify_exists
. Full description
Django 1.2 (correctif)
Django 1.3 (correctif)
Information leakage/arbitrary request issuance via URLField.verify_exists
.
Full description
Django 1.2: (correctif)
Django 1.3: (correctif)
Host
header cache poisoning. Full description
Django 1.2 (correctif)
Django 1.3 (correctif)
Potential CSRF via Host
header. Full description
This notification was an advisory only, so no patches were issued.
XSS via failure to validate redirect scheme. Full description
Django 1.3: (correctif)
Django 1.4: (correctif)
Denial-of-service via compressed image files. Full description
Django 1.3: (correctif)
Django 1.4: (correctif)
Denial-of-service via large image files. Full description
Django 1.3 (correctif)
Django 1.4 (correctif)
Host
header poisoning. Full description
Django 1.3 (correctif)
Django 1.4 (correctif)
Additional hardening of Host
header handling. Full description
Django 1.3 (correctif)
Django 1.4 (correctif)
Additional hardening of redirect validation. Full description
Django 1.3: (correctif)
Django 1.4: (correctif)
Additional hardening of Host
header handling. Full description
Django 1.3 (correctif)
Django 1.4 (correctif)
Entity-based attacks against Python XML libraries. Full description
Django 1.3 (correctif)
Django 1.4 (correctif)
Information leakage via admin history log. Full description
Django 1.3 (correctif)
Django 1.4 (correctif)
Denial-of-service via formset max_num
bypass. Full description
Django 1.3 (correctif)
Django 1.4 (correctif)
XSS via admin trusting URLField
values. Full description
Django 1.5 (correctif)
Possible XSS via unvalidated URL redirect schemes. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Directory-traversal via ssi
template tag. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Denial-of-service via large passwords. Full description
Django 1.5 (correctif)
Unexpected code execution using reverse()
. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
Caching of anonymous pages could reveal CSRF token. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
MySQL typecasting causes unexpected query results. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
Caches may be allowed to store and serve private data. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
Malformed URLs from user input incorrectly validated. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
reverse()
can generate URLs pointing to other hosts. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
File upload denial of service. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
RemoteUserMiddleware
session hijacking. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
Data leakage via querystring manipulation in admin. Full description
Django 1.4 (correctif)
Django 1.5 (correctif)
Django 1.6 (correctif)
Django 1.7 (correctif)
WSGI header spoofing via underscore/dash conflation. Full description
Mitigated possible XSS attack via user-supplied redirect URLs. Full description
Denial-of-service attack against django.views.static.serve()
. Full
description
Database denial-of-service with ModelMultipleChoiceField
. Full description
XSS attack via properties in ModelAdmin.readonly_fields
. Full description
Denial-of-service possibility with strip_tags()
. Full description
Django 1.6 `(correctif) <https://github.com/django/django/commit/b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f> `__
Django 1.7 `(correctif) <https://github.com/django/django/commit/e63363f8e075fa8d66326ad6a1cc3391cc95cd97> `__
Django 1,8 `(correctif) <https://github.com/django/django/commit/5447709a571cd5d95971f1d5d21d4a7edcf85bbd> `__
Mitigated possible XSS attack via user-supplied redirect URLs. Full description
Django 1.4 `(correctif) <https://github.com/django/django/commit/2342693b31f740a422abf7267c53b4e7bc487c1b> `__
Django 1.6 `(correctif) <https://github.com/django/django/commit/5510f070711540aaa8d3707776cd77494e688ef9> `__
Django 1.7 `(correctif) <https://github.com/django/django/commit/2a4113dbd532ce952308992633d802dc169a75f1> `__
Django 1.8 `(correctif) <https://github.com/django/django/commit/770427c2896a078925abfca2317486b284d22f04> `__
Fixed session flushing in the cached_db backend. Full description
Django 1.8 `(correctif) <https://github.com/django/django/commit/31cb25adecba930bdeee4556709f5a1c42d88fd6> `__
Denial-of-service possibility by filling session store. Full description
Django 1.8 `(correctif) <https://github.com/django/django/commit/66d12d1ababa8f062857ee5eb43276493720bf16> `__
Django 1.7 `(correctif) <https://github.com/django/django/commit/1828f4341ec53a8684112d24031b767eba557663> `__
Django 1.4 `(correctif) <https://github.com/django/django/commit/2e47f3e401c29bc2ba5ab794d483cb0820855fb9> `__
Header injection possibility since validators accept newlines in input. Full description
Django 1.8 `(correctif) <https://github.com/django/django/commit/574dd5e0b0fbb877ae5827b1603d298edc9bb2a0> `__
Django 1.7 `(correctif) <https://github.com/django/django/commit/ae49b4d994656bc037513dcd064cb9ce5bb85649> `__
Django 1.4 `(correctif) <https://github.com/django/django/commit/1ba1cdce7d58e6740fe51955d945b56ae51d072a> `__
Denial-of-service possibility in URL validation. Full description
Django 1.8 `(correctif) <https://github.com/django/django/commit/8f9a4d3a2bc42f14bb437defd30c7315adbff22c> `__
Denial-of-service possibility in logout()
view by filling session store.
Full description
Django 1.8 `(correctif) <https://github.com/django/django/commit/2eb86b01d7b59be06076f6179a454d0fd0afaff6> `__
Django 1.7 `(correctif) <https://github.com/django/django/commit/2f5485346ee6f84b4e52068c04e043092daf55f7> `__
Django 1.4 `(correctif) <https://github.com/django/django/commit/575f59f9bc7c59a5e41a081d1f5f55fc859c5012> `__
Settings leak possibility in date
template filter. Full description
Django 1.8 `(correctif) <https://github.com/django/django/commit/9f83fc2f66f5a0bac7c291aec55df66050bb6991> `__
Django 1.7 `(correctif) <https://github.com/django/django/commit/8a01c6b53169ee079cb21ac5919fdafcc8c5e172> `__
User with “change” but not “add” permission can create objects for
ModelAdmin
’s with save_as=True
. Full description
Django 1.9 `(correctif) <https://github.com/django/django/commit/adbca5e4db42542575734b8e5d26961c8ada7265> `__
Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth. Full description
Django 1.9 `(correctif) <https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380> `__
Django 1.8 `(correctif) <https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350> `__
User enumeration through timing difference on password hasher work factor upgrade. Full description
Django 1.9 `(correctif) <https://github.com/django/django/commit/af7d09b0c5c6ab68e629fd9baf736f9dd203b18e> `__
Django 1.8 `(correctif) <https://github.com/django/django/commit/f4e6e02f7713a6924d16540be279909ff4091eb6> `__
XSS in admin’s add/change related popup. Full description
CSRF protection bypass on a site with Google Analytics. Full description
User with hardcoded password created when running tests on Oracle. Full description
DNS rebinding vulnerability when DEBUG=True
. Full description
avr. 04, 2017