The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2934-1 | python-django security update |
EUVD |
EUVD-2014-0009 | The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users. |
Github GHSA |
GHSA-89hj-xfx5-7q66 | Django Reuses Cached CSRF Token |
Ubuntu USN |
USN-2169-1 | Django vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T09:20:18.401Z
Reserved: 2013-12-19T00:00:00.000Z
Link: CVE-2014-0473
No data.
Status : Deferred
Published: 2014-04-23T15:55:03.127
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0473
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN