USN-1632-1: Django vulnerability
15 November 2012
Django could be made to expose sensitive information over the network.
Releases
Packages
- python-django - High-level Python web development framework
Details
James Kettle discovered Django did not properly filter the Host HTTP header
when processing certain requests. An attacker could exploit this to
generate and display arbitrary URLs to users.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 10.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-1757-1: python-django