diff options
| author | Andreas Hug <andreas.hug@moccu.com> | 2018-07-24 16:18:17 -0400 |
|---|---|---|
| committer | Tim Graham <timograham@gmail.com> | 2018-07-25 12:13:03 -0400 |
| commit | d6eaee092709aad477a9894598496c6deec532ff (patch) | |
| tree | 1b0a5d386ed8b6915cd3507bc2665ded4f3beb3d /docs | |
| parent | 4fd1f6702aaa9ca9b9918dbdb79546557a00d331 (diff) | |
[1.11.x] Fixed CVE-2018-14574 -- Fixed open redirect possibility in CommonMiddleware.
Diffstat (limited to 'docs')
| -rw-r--r-- | docs/releases/1.11.15.txt | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/docs/releases/1.11.15.txt b/docs/releases/1.11.15.txt index 397681d52e..fca551e772 100644 --- a/docs/releases/1.11.15.txt +++ b/docs/releases/1.11.15.txt @@ -5,3 +5,16 @@ Django 1.11.15 release notes *August 1, 2018* Django 1.11.15 fixes a security issue in 1.11.14. + +CVE-2018-14574: Open redirect possibility in ``CommonMiddleware`` +================================================================= + +If the :class:`~django.middleware.common.CommonMiddleware` and the +:setting:`APPEND_SLASH` setting are both enabled, and if the project has a +URL pattern that accepts any path ending in a slash (many content management +systems have such a pattern), then a request to a maliciously crafted URL of +that site could lead to a redirect to another site, enabling phishing and other +attacks. + +``CommonMiddleware`` now escapes leading slashes to prevent redirects to other +domains. |
