Django 2.1.9 release notes¶
June 3, 2019
Django 2.1.9 fixes security issues in 2.1.8.
CVE-2019-12308: AdminURLFieldWidget XSS¶
The clickable “Current URL” link generated by AdminURLFieldWidget
displayed
the provided value without validating it as a safe URL. Thus, an unvalidated
value stored in the database, or a value provided as a URL query parameter
payload, could result in an clickable JavaScript link.
AdminURLFieldWidget
now validates the provided value using
URLValidator
before displaying the clickable
link. You may customize the validator by passing a validator_class
kwarg to
AdminURLFieldWidget.__init__()
, e.g. when using
formfield_overrides
.
Patched bundled jQuery for CVE-2019-11358: Prototype pollution¶
jQuery before 3.4.0, mishandles jQuery.extend(true, {}, ...)
because of
Object.prototype
pollution. If an unsanitized source object contained an
enumerable __proto__
property, it could extend the native
Object.prototype
.
The bundled version of jQuery used by the Django admin has been patched to
allow for the select2
library’s use of jQuery.extend()
.