summaryrefslogtreecommitdiff
path: root/docs/releases
diff options
context:
space:
mode:
authorAndreas Hug <andreas.hug@moccu.com>2018-07-24 16:18:17 -0400
committerTim Graham <timograham@gmail.com>2018-08-01 09:35:09 -0400
commitc4e5ff7fdb5fce447675e90291fd33fddd052b3c (patch)
treeb1c98d1ece0565e0cdb66907d9d9e9e5e2e17cad /docs/releases
parentb3234256616b0a6c8195715cbd8c850cee2cc064 (diff)
[2.1.x] Fixed CVE-2018-14574 -- Fixed open redirect possibility in CommonMiddleware.
Diffstat (limited to 'docs/releases')
-rw-r--r--docs/releases/1.11.15.txt13
-rw-r--r--docs/releases/2.0.8.txt13
2 files changed, 26 insertions, 0 deletions
diff --git a/docs/releases/1.11.15.txt b/docs/releases/1.11.15.txt
index 397681d52e..fca551e772 100644
--- a/docs/releases/1.11.15.txt
+++ b/docs/releases/1.11.15.txt
@@ -5,3 +5,16 @@ Django 1.11.15 release notes
*August 1, 2018*
Django 1.11.15 fixes a security issue in 1.11.14.
+
+CVE-2018-14574: Open redirect possibility in ``CommonMiddleware``
+=================================================================
+
+If the :class:`~django.middleware.common.CommonMiddleware` and the
+:setting:`APPEND_SLASH` setting are both enabled, and if the project has a
+URL pattern that accepts any path ending in a slash (many content management
+systems have such a pattern), then a request to a maliciously crafted URL of
+that site could lead to a redirect to another site, enabling phishing and other
+attacks.
+
+``CommonMiddleware`` now escapes leading slashes to prevent redirects to other
+domains.
diff --git a/docs/releases/2.0.8.txt b/docs/releases/2.0.8.txt
index 8a03071075..849f80d3f8 100644
--- a/docs/releases/2.0.8.txt
+++ b/docs/releases/2.0.8.txt
@@ -6,6 +6,19 @@ Django 2.0.8 release notes
Django 2.0.8 fixes a security issue and several bugs in 2.0.7.
+CVE-2018-14574: Open redirect possibility in ``CommonMiddleware``
+=================================================================
+
+If the :class:`~django.middleware.common.CommonMiddleware` and the
+:setting:`APPEND_SLASH` setting are both enabled, and if the project has a
+URL pattern that accepts any path ending in a slash (many content management
+systems have such a pattern), then a request to a maliciously crafted URL of
+that site could lead to a redirect to another site, enabling phishing and other
+attacks.
+
+``CommonMiddleware`` now escapes leading slashes to prevent redirects to other
+domains.
+
Bugfixes
========