The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1036899 | Third Party Advisory |
https://www.djangoproject.com/weblog/2016/sep/26/security-releases/ | Patch Vendor Advisory |
http://www.debian.org/security/2016/dsa-3678 | Third Party Advisory |
http://www.securityfocus.com/bid/93182 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-3089-1 | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2016-2043.html | |
http://rhn.redhat.com/errata/RHSA-2016-2042.html | |
http://rhn.redhat.com/errata/RHSA-2016-2041.html | |
http://rhn.redhat.com/errata/RHSA-2016-2040.html | |
http://rhn.redhat.com/errata/RHSA-2016-2039.html | |
http://rhn.redhat.com/errata/RHSA-2016-2038.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2016-10-03 11:59
Updated : 2018-01-04 18:31
NVD link : CVE-2016-7401
Mitre link : CVE-2016-7401
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
djangoproject
- django