CVE-2011-0696
Published: 14 February 2011
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
Priority
Status
Package | Release | Status |
---|---|---|
python-django Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Ignored
(end of life)
|
|
karmic |
Released
(1.1.1-1ubuntu1.2)
|
|
lucid |
Released
(1.1.1-2ubuntu1.3)
|
|
maverick |
Released
(1.2.3-1ubuntu0.2.10.10.2)
|
|
natty |
Released
(1.2.5-1ubuntu1)
|
|
oneiric |
Released
(1.2.5-1ubuntu1)
|
|
upstream |
Released
(1.1.4, 1.2.5-1)
|
|
Patches: upstream: http://code.djangoproject.com/changeset/15464 (trunk) upstream: http://code.djangoproject.com/changeset/15465 (1.2) upstream: http://code.djangoproject.com/changeset/15466 (1.1) |