You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Older versions of Django don't validate the Host header against settings.ALLOWED_HOSTS when settings.DEBUG=True. This makes them
vulnerable to a DNS rebinding attack <http://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/>_.
While Django doesn't ship a module that allows remote code execution, this is
at least a cross-site scripting vector, which could be quite serious if
developers load a copy of the production database in development or connect to
some production services for which there's no development instance, for
example. If a project uses a package like the django-debug-toolbar, then
the attacker could execute arbitrary SQL, which could be especially bad if the
developers connect to the database with a superuser account.
The text was updated successfully, but these errors were encountered:
agconti
changed the title
Upgrade Django to secure version
Upgrade Django to secure version, 1.9.11
Nov 17, 2016
Older versions of Django don't validate the
Host
header againstsettings.ALLOWED_HOSTS
whensettings.DEBUG=True
. This makes themvulnerable to a
DNS rebinding attack <http://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/>
_.While Django doesn't ship a module that allows remote code execution, this is
at least a cross-site scripting vector, which could be quite serious if
developers load a copy of the production database in development or connect to
some production services for which there's no development instance, for
example. If a project uses a package like the
django-debug-toolbar
, thenthe attacker could execute arbitrary SQL, which could be especially bad if the
developers connect to the database with a superuser account.
The text was updated successfully, but these errors were encountered: