CVE-2011-4140

The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*

History

21 Nov 2024, 01:31

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2011/09/11/1 - Patch () http://openwall.com/lists/oss-security/2011/09/11/1 - Patch
References () http://openwall.com/lists/oss-security/2011/09/13/2 - Patch () http://openwall.com/lists/oss-security/2011/09/13/2 - Patch
References () http://secunia.com/advisories/46614 - () http://secunia.com/advisories/46614 -
References () http://www.debian.org/security/2011/dsa-2332 - () http://www.debian.org/security/2011/dsa-2332 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=737366 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=737366 - Patch
References () https://hermes.opensuse.org/messages/14700881 - () https://hermes.opensuse.org/messages/14700881 -
References () https://www.djangoproject.com/weblog/2011/sep/09/ - Patch, Vendor Advisory () https://www.djangoproject.com/weblog/2011/sep/09/ - Patch, Vendor Advisory
References () https://www.djangoproject.com/weblog/2011/sep/10/127/ - Patch () https://www.djangoproject.com/weblog/2011/sep/10/127/ - Patch

Information

Published : 2011-10-19 10:55

Updated : 2024-11-21 01:31


NVD link : CVE-2011-4140

Mitre link : CVE-2011-4140

CVE.ORG link : CVE-2011-4140


JSON object : View

Products Affected

djangoproject

  • django
CWE
CWE-352

Cross-Site Request Forgery (CSRF)