The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2169-1 | vendor advisory |
https://www.djangoproject.com/weblog/2014/apr/21/security/ | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-0457.html | vendor advisory |
http://secunia.com/advisories/61281 | third party advisory |
http://www.debian.org/security/2014/dsa-2934 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-0456.html | vendor advisory |