summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorFlorian Apolloner <florian@apolloner.eu>2015-11-11 20:10:55 +0100
committerTim Graham <timograham@gmail.com>2015-11-24 12:04:55 -0500
commit3ebbda0aef9e7a90ac6208bb8f9bc21228e2c7da (patch)
treed5ca8e7c58101e33c13b4a27c78a94b9901cd26a /docs
parent11d54e8f0da96d355b8dff17af8d5aa6bb3386db (diff)
[1.9.x] Fixed a settings leak possibility in the date template filter.
This is a security fix.
Diffstat (limited to 'docs')
-rw-r--r--docs/releases/1.7.11.txt15
-rw-r--r--docs/releases/1.8.7.txt15
2 files changed, 28 insertions, 2 deletions
diff --git a/docs/releases/1.7.11.txt b/docs/releases/1.7.11.txt
index 7c6153eab1..8f2f5e7541 100644
--- a/docs/releases/1.7.11.txt
+++ b/docs/releases/1.7.11.txt
@@ -4,7 +4,20 @@ Django 1.7.11 release notes
*Under development*
-Django 1.7.11 fixes a data loss bug in 1.7.10.
+Django 1.7.11 fixes a security issue and a data loss bug in 1.7.10.
+
+Fixed settings leak possibility in ``date`` template filter
+===========================================================
+
+If an application allows users to specify an unvalidated format for dates and
+passes this format to the :tfilter:`date` filter, e.g.
+``{{ last_updated|date:user_date_format }}``, then a malicious user could
+obtain any secret in the application's settings by specifying a settings key
+instead of a date format. e.g. ``"SECRET_KEY"`` instead of ``"j/m/Y"``.
+
+To remedy this, the underlying function used by the ``date`` template filter,
+``django.utils.formats.get_format()``, now only allows accessing the date/time
+formatting settings.
Bugfixes
========
diff --git a/docs/releases/1.8.7.txt b/docs/releases/1.8.7.txt
index 25f7712f10..77d5e9f901 100644
--- a/docs/releases/1.8.7.txt
+++ b/docs/releases/1.8.7.txt
@@ -4,11 +4,24 @@ Django 1.8.7 release notes
*Under development*
-Django 1.8.7 fixes several bugs in 1.8.6.
+Django 1.8.7 fixes a security issue and several bugs in 1.8.6.
Additionally, Django's vendored version of six, :mod:`django.utils.six`, has
been upgraded to the latest release (1.10.0).
+Fixed settings leak possibility in ``date`` template filter
+===========================================================
+
+If an application allows users to specify an unvalidated format for dates and
+passes this format to the :tfilter:`date` filter, e.g.
+``{{ last_updated|date:user_date_format }}``, then a malicious user could
+obtain any secret in the application's settings by specifying a settings key
+instead of a date format. e.g. ``"SECRET_KEY"`` instead of ``"j/m/Y"``.
+
+To remedy this, the underlying function used by the ``date`` template filter,
+``django.utils.formats.get_format()``, now only allows accessing the date/time
+formatting settings.
+
Bugfixes
========