03.06.2019       Выпуск 285 (03.06.2019 - 09.06.2019)       Релизы

Django security releases issued: 2.2.2, 2.1.9 and 1.11.21


Экспериментальная функция:

Ниже вы видите текст статьи по ссылке. По нему можно быстро понять ссылка достойна прочтения или нет

Просим обратить внимание, что текст по ссылке и здесь может не совпадать.

CVE-2019-12308: AdminURLFieldWidget XSS

The clickable "Current URL" link generated byAdminURLFieldWidgetdisplayed the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.

AdminURLFieldWidgetnow validates the provided value usingURLValidatorbefore displaying the clickable link. You may customise the validator by passing avalidator_classkwarg toAdminURLFieldWidget.__init__(), e.g. when usingModelAdmin.formfield_overrides.

Affected versions

  • Django master development branch
  • Django 2.2 before version 2.2.2
  • Django 2.1 before version 2.1.9
  • Django 1.11 before version 1.11.21

Patched bundled jQuery for CVE-2019-11358: Prototype pollution

jQuery before 3.4.0, mishandlesjQuery.extend(true, {}, ...)because ofObject.prototypepollution. If an unsanitized source object contained an enumerable__proto__property, it could extend the nativeObject.prototype.

The bundled version of jQuery used by the Django admin has been patched to allow for theselect2library's use ofjQuery.extend().

Affected versions

  • Django master development branch
  • Django 2.2 before version 2.2.2
  • Django 2.1 before version 2.1.9


Patches to resolve these issues have been applied to Django's master branch and the 2.2, 2.1, and 1.11 release branches. The patches may be obtained from the following changesets:

On the master branch:

On the 2.2 release branch:

On the 2.1 release branch:

On the 1.11 release branch:

The following releases have been issued:

The PGP key ID used for these releases is Carlton Gibson: E17DF5C82B4F9D00.

General notes regarding security reporting

As always, we ask that potential security issues be reported via private email tosecurity@djangoproject.com, and not via Django's Trac instance or the django-developers list. Please see our security policies for further information.

Разместим вашу рекламу

Пиши: mail@pythondigest.ru

Нашли опечатку?

Выделите фрагмент и отправьте нажатием Ctrl+Enter.

Система Orphus