1
- ==========================
1
+ ===========================
2
2
Django 1.4.13 release notes
3
- ==========================
3
+ ===========================
4
4
5
- *May 13 , 2014*
5
+ *May 14 , 2014*
6
6
7
7
Django 1.4.13 fixes two security issues in 1.4.12.
8
8
9
-
10
9
Caches may incorrectly be allowed to store and serve private data
11
10
=================================================================
11
+
12
12
In certain situations, Django may allow caches to store private data
13
13
related to a particular session and then serve that data to requests
14
- with a different session, or no session at all. This can both lead to
15
- information disclosure, and can be a vector for cache poisoning.
14
+ with a different session, or no session at all. This can lead to
15
+ information disclosure and can be a vector for cache poisoning.
16
16
17
17
When using Django sessions, Django will set a ``Vary: Cookie`` header to
18
18
ensure caches do not serve cached data to requests from other sessions.
@@ -22,15 +22,15 @@ Explorer 6, and Internet Explorer 7 if run on Windows XP or Windows Server
22
22
types. Therefore, Django would remove the header if the request was made by
23
23
Internet Explorer.
24
24
25
- To remedy this, the special behaviour for these older Internet Explorer versions
25
+ To remedy this, the special behavior for these older Internet Explorer versions
26
26
has been removed, and the ``Vary`` header is no longer stripped from the response.
27
27
In addition, modifications to the ``Cache-Control`` header for all Internet Explorer
28
- requests with a ``Content-Disposition`` header, have also been removed as they
28
+ requests with a ``Content-Disposition`` header have also been removed as they
29
29
were found to have similar issues.
30
30
31
-
32
31
Malformed redirect URLs from user input not correctly validated
33
32
===============================================================
33
+
34
34
The validation for redirects did not correctly validate some malformed URLs,
35
35
which are accepted by some browsers. This allows a user to be redirected to
36
36
an unsafe URL unexpectedly.
0 commit comments