The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Link | Tags |
---|---|
http://www.debian.org/security/2016/dsa-3678 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2040.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2043.html | vendor advisory |
http://www.securitytracker.com/id/1036899 | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2016-2041.html | vendor advisory |
https://www.djangoproject.com/weblog/2016/sep/26/security-releases/ | patch vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2042.html | vendor advisory |
http://www.ubuntu.com/usn/USN-3089-1 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/93182 | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2016-2038.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2039.html | vendor advisory |