summaryrefslogtreecommitdiffstats
path: root/package/python-django/Config.in
diff options
context:
space:
mode:
authorPeter Korsgaard <peter@korsgaard.com>2017-04-27 09:37:18 +0200
committerPeter Korsgaard <peter@korsgaard.com>2017-04-27 21:27:27 +0200
commit3a66a81b7a9db8e45f15fa63cc0670d158003d5a (patch)
tree7ca309c9a9738365aa6470ca5d8ab1cf0f0b1e76 /package/python-django/Config.in
parent833082fdb4c7c242a24486cffffc1e9a6f597732 (diff)
downloadbuildroot-3a66a81b7a9db8e45f15fa63cc0670d158003d5a.tar.gz
buildroot-3a66a81b7a9db8e45f15fa63cc0670d158003d5a.zip
python-django: security bump to version 1.10.7
Fixes the following security issues: Since 1.10.3: CVE-2016-9013 - User with hardcoded password created when running tests on Oracle Marti Raudsepp reported that a user with a hardcoded password is created when running tests with an Oracle database. CVE-2016-9014 - DNS rebinding vulnerability when DEBUG=True Aymeric Augustin discovered that Django does not properly validate the Host header against settings.ALLOWED_HOSTS when the debug setting is enabled. A remote attacker can take advantage of this flaw to perform DNS rebinding attacks. Since 1.10.7: CVE-2017-7233 - Open redirect and possible XSS attack via user-supplied numeric redirect URLs It was discovered that is_safe_url() does not properly handle certain numeric URLs as safe. A remote attacker can take advantage of this flaw to perform XSS attacks or to use a Django server as an open redirect. CVE-2017-7234 - Open redirect vulnerability in django.views.static.serve() Phithon from Chaitin Tech discovered an open redirect vulnerability in the django.views.static.serve() view. Note that this view is not intended for production use. Cc: Oli Vogt <oli.vogt.pub01@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/python-django/Config.in')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud