The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:djangoproject:django:1.9.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "1.9.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "12.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "14.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "16.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": [
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "1.8.14"
},
{
"last_affected": "1.9.1"
},
{
"last_affected": "1.9.2"
},
{
"last_affected": "1.9.3"
},
{
"last_affected": "1.9.4"
},
{
"last_affected": "1.9.5"
},
{
"last_affected": "1.9.6"
},
{
"last_affected": "1.9.7"
},
{
"last_affected": "1.9.8"
},
{
"last_affected": "1.9.9"
}
],
"source": "CPE_FIELD"
}