[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/www/py-django
Module Name: pkgsrc
Committed By: adam
Date: Sat Feb 23 17:00:19 UTC 2013
pkgsrc/www/py-django: Makefile distinfo
Security-fix release. Here's a brief summary of each issue and its resolution:
Issue: Host header poisoning: an attacker could cause Django to generate and
display URLs that link to arbitrary domains. This could be used as part of a
phishing attack. These releases fix this problem by introducing a new setting,
ALLOWED_HOSTS, which specifies a whitelist of domains your site is known to
Important: by default Django 1.3.6 and 1.4.4 set ALLOWED_HOSTS to allow all
hosts. This means that to actually fix the security vulnerability you should
define this setting yourself immediately after upgrading.
Issue: Formset denial-of-service: an attacker can abuse Django's tracking of
the number of forms in a formset to cause a denial-of-service attack. This has
been fixed by adding a default maximum number of forms of 1,000. You can still
manually specify a bigger max_num, if you wish, but 1,000 should be enough for
Issue: XML attacks: Django's serialization framework was vulnerable to attacks
via XML entity expansion and external references; this is now fixed. However,
if you're parsing arbitrary XML in other parts of your application, we
recommend you look into the defusedxml Python packages which remedy this
anywhere you parse XML, not just via Django's serialization framework.
Issue: Data leakage via admin history log: Django's admin interface could
expose supposedly-hidden information via its history log. This has been fixed.
To generate a diff of this commit:
cvs rdiff -u -r1.38 -r1.39 pkgsrc/www/py-django/Makefile
cvs rdiff -u -r1.23 -r1.24 pkgsrc/www/py-django/distinfo
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Main Index |
Thread Index |