CVE-2014-0473
23.04.2014, 15:55
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.Enginsight
Vendor | Product | Version |
---|---|---|
djangoproject | django | 1.5 |
djangoproject | django | 1.5.1 |
djangoproject | django | 1.5.2 |
djangoproject | django | 1.5.3 |
djangoproject | django | 1.5.4 |
djangoproject | django | 1.5.5 |
djangoproject | django | 1.6 |
djangoproject | django | 1.6.1 |
djangoproject | django | 1.6.2 |
djangoproject | django | 1.7:alpha1 |
djangoproject | django | 1.7:alpha2 |
djangoproject | django | 1.7:beta1 |
djangoproject | django | 𝑥 ≤ 1.4.10 |
djangoproject | django | 1.4 |
djangoproject | django | 1.4.1 |
djangoproject | django | 1.4.2 |
djangoproject | django | 1.4.3 |
djangoproject | django | 1.4.4 |
djangoproject | django | 1.4.5 |
djangoproject | django | 1.4.6 |
djangoproject | django | 1.4.7 |
djangoproject | django | 1.4.8 |
djangoproject | django | 1.4.9 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
canonical | ubuntu_linux | 13.10 |
canonical | ubuntu_linux | 14.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References