Closed
Bug 637525
Opened 14 years ago
Closed 14 years ago
Upgrade Django to Address CSRF Weakness
Categories
(developer.mozilla.org Graveyard :: User management, task)
developer.mozilla.org Graveyard
User management
Tracking
(Not tracked)
VERIFIED
FIXED
0.9.5
People
(Reporter: mcoates, Unassigned)
Details
(Keywords: wsec-csrf, Whiteboard: [infrasec:crsf][ws:critical])
Django needs to be upgraded to the current version to address a weakness in CSRF handling.
Note: This upgrade requires changes to the code in order for AJAX requests to continue working. Specifically, the AJAX requests must be modified to inlclude the CSRF token or the request will fail.
http://www.djangoproject.com/weblog/2011/feb/08/security/
Please schedule MDN to upgrade django as soon as possible
Reporter | ||
Comment 1•14 years ago
|
||
Wil, is this you? Who handles dev.m.o?
Comment 2•14 years ago
|
||
Might be Les now, some stuff just shifted around. Morgamic has the chart!
Comment 3•14 years ago
|
||
Chart should be on a wiki somewhere. :)
Comment 4•14 years ago
|
||
Still wrapping my head around MDN. The only spot I know that uses Django CSRF in MDN is the submission form for Demo Studio, which also uses a captcha. Not sure if there are more...? lcrouch might know too
Comment 5•14 years ago
|
||
Demo submission, but probably also content flagging and/or rating? Anything that does a POST I think.
Reporter | ||
Updated•14 years ago
|
Whiteboard: [infrasec:crsf][ws:critical]
Reporter | ||
Comment 6•14 years ago
|
||
Ping - is more work needed here to upgrade MDN?
Comment 7•14 years ago
|
||
Yeah, we still need to upgrade MDN from 1.2.3 to 1.2.5. I will add this to our next release.
Target Milestone: --- → 0.9.5
Updated•14 years ago
|
Assignee: nobody → lcrouch
Comment 8•14 years ago
|
||
Raymond, we need to pass thru all the MDN stuff - landing, learning, and demos - and make sure 1.2.5 didn't break anything. Good use for the expanded selenium test suite.
Assignee: lcrouch → mozbugs.retornam
Status: NEW → RESOLVED
Closed: 14 years ago
Keywords: qawanted
Resolution: --- → FIXED
Comment 9•14 years ago
|
||
https://developer-stage9.mozilla.org/ looks good to me so far
Updated•14 years ago
|
Assignee: mozbugs.retornam → nobody
Comment 10•14 years ago
|
||
has this been propped to production yet?
Comment 11•14 years ago
|
||
it's on stage9, I can't check production - unless someone knows how to check without import django; django.VERSION ?
assigning to IT.
python26 manage.py shell
import django
django.VERSION
Assignee: nobody → server-ops
Comment 12•14 years ago
|
||
(In reply to comment #11)
> it's on stage9, I can't check production - unless someone knows how to check
> without import django; django.VERSION ?
>
> assigning to IT.
>
> python26 manage.py shell
> import django
> django.VERSION
Django should be whatever we have in kuma-lib:
https://github.com/mozilla/kuma-lib/tree/master/src
Can't hurt to have IT check this, but we have a problem if it's anything different than what's here (the submodule in kuma-lib):
https://github.com/django/django/blob/b8ac1085778ebed65a5c6d2af6dda4eff82bb66f/django/__init__.py
Comment 13•14 years ago
|
||
Any update on this?
Comment 14•14 years ago
|
||
(In reply to comment #13)
> Any update on this?
adding people who deal with mdn nowadays
Comment 15•14 years ago
|
||
Production reports this:
In [2]: django.VERSION
Out[2]: (1, 2, 5, 'final', 0)
Updated•13 years ago
|
Component: Administration → User management
Comment 17•9 years ago
|
||
For bugs that are resolved, we remove the security flag. These haven't had their flag removed, so I'm removing it now.
Group: websites-security
Updated•5 years ago
|
Product: developer.mozilla.org → developer.mozilla.org Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•