2014-05-17 06:19:23 +08:00
|
|
|
==========================
|
|
|
|
Django 1.6.6 release notes
|
|
|
|
==========================
|
|
|
|
|
2014-08-21 04:31:45 +08:00
|
|
|
*August 20, 2014*
|
2014-05-17 06:19:23 +08:00
|
|
|
|
2014-08-06 03:20:05 +08:00
|
|
|
Django 1.6.6 fixes several security issues and bugs in 1.6.5.
|
2014-05-17 06:19:23 +08:00
|
|
|
|
2014-07-18 03:59:28 +08:00
|
|
|
:func:`~django.core.urlresolvers.reverse()` could generate URLs pointing to other hosts
|
|
|
|
=======================================================================================
|
|
|
|
|
|
|
|
In certain situations, URL reversing could generate scheme-relative URLs (URLs
|
|
|
|
starting with two slashes), which could unexpectedly redirect a user to a
|
|
|
|
different host. An attacker could exploit this, for example, by redirecting
|
|
|
|
users to a phishing site designed to ask for user's passwords.
|
|
|
|
|
|
|
|
To remedy this, URL reversing now ensures that no URL starts with two slashes
|
|
|
|
(//), replacing the second slash with its URL encoded counterpart (%2F). This
|
|
|
|
approach ensures that semantics stay the same, while making the URL relative to
|
|
|
|
the domain and not to the scheme.
|
|
|
|
|
2014-08-08 22:20:08 +08:00
|
|
|
File upload denial-of-service
|
|
|
|
=============================
|
|
|
|
|
|
|
|
Before this release, Django's file upload handing in its default configuration
|
|
|
|
may degrade to producing a huge number of ``os.stat()`` system calls when a
|
|
|
|
duplicate filename is uploaded. Since ``stat()`` may invoke IO, this may produce
|
|
|
|
a huge data-dependent slowdown that slowly worsens over time. The net result is
|
|
|
|
that given enough time, a user with the ability to upload files can cause poor
|
|
|
|
performance in the upload handler, eventually causing it to become very slow
|
|
|
|
simply by uploading 0-byte files. At this point, even a slow network connection
|
|
|
|
and few HTTP requests would be all that is necessary to make a site unavailable.
|
|
|
|
|
|
|
|
We've remedied the issue by changing the algorithm for generating file names
|
|
|
|
if a file with the uploaded name already exists.
|
|
|
|
:meth:`Storage.get_available_name()
|
|
|
|
<django.core.files.storage.Storage.get_available_name>` now appends an
|
|
|
|
underscore plus a random 7 character alphanumeric string (e.g. ``"_x3a1gho"``),
|
|
|
|
rather than iterating through an underscore followed by a number (e.g. ``"_1"``,
|
|
|
|
``"_2"``, etc.).
|
|
|
|
|
2014-07-28 12:54:29 +08:00
|
|
|
``RemoteUserMiddleware`` session hijacking
|
|
|
|
==========================================
|
|
|
|
|
|
|
|
When using the :class:`~django.contrib.auth.middleware.RemoteUserMiddleware`
|
|
|
|
and the ``RemoteUserBackend``, a change to the ``REMOTE_USER`` header between
|
|
|
|
requests without an intervening logout could result in the prior user's session
|
|
|
|
being co-opted by the subsequent user. The middleware now logs the user out on
|
|
|
|
a failed login attempt.
|
|
|
|
|
2014-08-07 12:18:10 +08:00
|
|
|
Data leakage via query string manipulation in ``contrib.admin``
|
|
|
|
===============================================================
|
|
|
|
|
|
|
|
In older versions of Django it was possible to reveal any field's data by
|
|
|
|
modifying the "popup" and "to_field" parameters of the query string on an admin
|
|
|
|
change form page. For example, requesting a URL like
|
|
|
|
``/admin/auth/user/?_popup=1&t=password`` and viewing the page's HTML allowed
|
|
|
|
viewing the password hash of each user. While the admin requires users to have
|
|
|
|
permissions to view the change form pages in the first place, this could leak
|
|
|
|
data if you rely on users having access to view only certain fields on a model.
|
|
|
|
|
|
|
|
To address the issue, an exception will now be raised if a ``to_field`` value
|
|
|
|
that isn't a related field to a model that has been registered with the admin
|
|
|
|
is specified.
|
|
|
|
|
2014-05-17 06:19:23 +08:00
|
|
|
Bugfixes
|
|
|
|
========
|
|
|
|
|
|
|
|
* Corrected email and URL validation to reject a trailing dash
|
2014-08-19 22:22:51 +08:00
|
|
|
(:ticket:`22579`).
|
2014-06-21 06:47:14 +08:00
|
|
|
|
2014-08-19 22:22:51 +08:00
|
|
|
* Prevented indexes on PostgreSQL virtual fields (:ticket:`22514`).
|
2014-07-17 01:34:53 +08:00
|
|
|
|
|
|
|
* Prevented edge case where values of FK fields could be initialized with a
|
|
|
|
wrong value when an inline model formset is created for a relationship
|
2014-08-19 22:22:51 +08:00
|
|
|
defined to point to a field other than the PK (:ticket:`13794`).
|
2014-07-17 01:34:53 +08:00
|
|
|
|
|
|
|
* Restored ``pre_delete`` signals for ``GenericRelation`` cascade deletion
|
2014-08-19 22:22:51 +08:00
|
|
|
(:ticket:`22998`).
|
2014-07-25 07:55:57 +08:00
|
|
|
|
|
|
|
* Fixed transaction handling when specifying non-default database in
|
2014-08-19 22:22:51 +08:00
|
|
|
``createcachetable`` and ``flush`` (:ticket:`23089`).
|
2014-07-29 21:39:19 +08:00
|
|
|
|
|
|
|
* Fixed the "ORA-01843: not a valid month" errors when using Unicode
|
2014-08-19 22:22:51 +08:00
|
|
|
with older versions of Oracle server (:ticket:`20292`).
|
2014-07-30 21:33:02 +08:00
|
|
|
|
|
|
|
* Restored bug fix for sending unicode email with Python 2.6.5 and below
|
2014-08-19 22:22:51 +08:00
|
|
|
(:ticket:`19107`).
|
2014-08-14 17:56:25 +08:00
|
|
|
|
|
|
|
* Prevented ``UnicodeDecodeError`` in ``runserver`` with non-UTF-8 and
|
2014-08-19 22:22:51 +08:00
|
|
|
non-English locale (:ticket:`23265`).
|
2014-08-15 16:11:53 +08:00
|
|
|
|
|
|
|
* Fixed JavaScript errors while editing multi-geometry objects in the OpenLayers
|
2014-08-19 22:22:51 +08:00
|
|
|
widget (:ticket:`23137`, :ticket:`23293`).
|
2014-07-13 01:37:59 +08:00
|
|
|
|
|
|
|
* Prevented a crash on Python 3 with query strings containing unencoded
|
2014-08-19 22:22:51 +08:00
|
|
|
non-ASCII characters (:ticket:`22996`).
|