CVE-2008-3909

NameCVE-2008-3909
DescriptionThe administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, web search, more)
ReferencesDSA-1640-1
NVD severitymedium (attack range: remote)
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)squeeze, squeeze (security)1.2.3-3+squeeze10fixed
squeeze (lts)1.2.3-3+squeeze15fixed
wheezy1.4.5-1+deb7u13fixed
wheezy (security)1.4.5-1+deb7u14fixed
jessie (security), jessie1.7.7-1+deb8u3fixed
stretch1.9.1-1fixed
sid1.9.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosource(unstable)1.0-1medium
python-djangosourceetch0.95.1-1etch2mediumDSA-1640-1

Notes

http://www.djangoproject.com/weblog/2008/sep/02/security/

Search for package or bug name: Reporting problems