The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Django | Djangoproject | 0.91 | 0.91 |
Django | Djangoproject | 0.95 | 0.95 |
Django | Djangoproject | 0.95.1 | 0.95.1 |
Django | Djangoproject | 0.96 | 0.96 |
Django | Djangoproject | 1.0 | 1.0 |
Django | Djangoproject | 1.0.1 | 1.0.1 |
Django | Djangoproject | 1.0.2 | 1.0.2 |
Django | Djangoproject | 1.1 | 1.1 |
Django | Djangoproject | 1.1.0 | 1.1.0 |
Django | Djangoproject | 1.1.2 | 1.1.2 |
Django | Djangoproject | 1.1.3 | 1.1.3 |
Django | Djangoproject | 1.2 | 1.2 |
Django | Djangoproject | 1.2.1 | 1.2.1 |
Django | Djangoproject | 1.2.1 | 1.2.1 |
Django | Djangoproject | 1.2.2 | 1.2.2 |
Django | Djangoproject | 1.2.3 | 1.2.3 |
Django | Djangoproject | 1.2.4 | 1.2.4 |
Django | Djangoproject | 1.2.5 | 1.2.5 |
Django | Djangoproject | * | 1.2.6 |
Django | Djangoproject | 1.3 | 1.3 |
Django | Djangoproject | 1.3 | 1.3 |
Django | Djangoproject | 1.3 | 1.3 |