Summary: | dev-python/django Admin panel Cross-site request forgery (CVE-2007-5828) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | trivial | CC: | python, seemant |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | ~1 [] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() Seemant, are we affected by this? Hi Robert & Security Co., This is a non-issue for django. The person who raised the issue, brought it up to django's upstream and was shown their CSRF middleware to protect against these attacks (documented here:http://www.djangoproject.com/documentation/0.96/csrf/ ). The reporter even *agreed* with upstream that there was, indeed, no issue. The reporter then went on to file the CVE. Closing as INVALID then. Upstream should notify Mitre if they contest the CVE entry and it will get noted. |