summaryrefslogtreecommitdiff
path: root/docs/releases/1.8.15.txt
diff options
context:
space:
mode:
authorCollin Anderson <cmawebsite@gmail.com>2016-03-11 21:36:08 -0500
committerTim Graham <timograham@gmail.com>2016-09-26 12:54:36 -0400
commitd1bc980db1c0fffd6d60677e62f70beadb9fe64a (patch)
treeb8b80839fe39268bc01f4f39c3930ab5b55aaadf /docs/releases/1.8.15.txt
parent07760d07146816bd9aa32786891bb24f467d713d (diff)
[1.9.x] Fixed CVE-2016-7401 -- Fixed CSRF protection bypass on a site with Google Analytics.
This is a security fix. Backport of "refs #26158 -- rewrote http.parse_cookie() to better match browsers." 93a135d111c2569d88d65a3f4ad9e6d9ad291452 from master
Diffstat (limited to 'docs/releases/1.8.15.txt')
-rw-r--r--docs/releases/1.8.15.txt18
1 files changed, 18 insertions, 0 deletions
diff --git a/docs/releases/1.8.15.txt b/docs/releases/1.8.15.txt
new file mode 100644
index 0000000000..e977cffbab
--- /dev/null
+++ b/docs/releases/1.8.15.txt
@@ -0,0 +1,18 @@
+===========================
+Django 1.8.15 release notes
+===========================
+
+*September 26, 2016*
+
+Django 1.8.15 fixes a security issue in 1.8.14.
+
+CSRF protection bypass on a site with Google Analytics
+======================================================
+
+An interaction between Google Analytics and Django's cookie parsing could allow
+an attacker to set arbitrary cookies leading to a bypass of CSRF protection.
+
+The parser for ``request.COOKIES`` is simplified to better match the behavior
+of browsers and to mitigate this attack. ``request.COOKIES`` may now contain
+cookies that are invalid according to :rfc:`6265` but are possible to set via
+``document.cookie``.