The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Django | Djangoproject | * | 1.2.6 (including) |
Django | Djangoproject | 0.91 (including) | 0.91 (including) |
Django | Djangoproject | 0.95 (including) | 0.95 (including) |
Django | Djangoproject | 0.95.1 (including) | 0.95.1 (including) |
Django | Djangoproject | 0.96 (including) | 0.96 (including) |
Django | Djangoproject | 1.0 (including) | 1.0 (including) |
Django | Djangoproject | 1.0.1 (including) | 1.0.1 (including) |
Django | Djangoproject | 1.0.2 (including) | 1.0.2 (including) |
Django | Djangoproject | 1.1 (including) | 1.1 (including) |
Django | Djangoproject | 1.1.0 (including) | 1.1.0 (including) |
Django | Djangoproject | 1.1.2 (including) | 1.1.2 (including) |
Django | Djangoproject | 1.1.3 (including) | 1.1.3 (including) |
Django | Djangoproject | 1.2 (including) | 1.2 (including) |
Django | Djangoproject | 1.2.1 (including) | 1.2.1 (including) |
Django | Djangoproject | 1.2.1-2 (including) | 1.2.1-2 (including) |
Django | Djangoproject | 1.2.2 (including) | 1.2.2 (including) |
Django | Djangoproject | 1.2.3 (including) | 1.2.3 (including) |
Django | Djangoproject | 1.2.4 (including) | 1.2.4 (including) |
Django | Djangoproject | 1.2.5 (including) | 1.2.5 (including) |
Django | Djangoproject | 1.3 (including) | 1.3 (including) |
Django | Djangoproject | 1.3-alpha1 (including) | 1.3-alpha1 (including) |
Django | Djangoproject | 1.3-alpha2 (including) | 1.3-alpha2 (including) |