VYPR
High severityNVD Advisory· Published Sep 4, 2008· Updated Apr 16, 2026

CVE-2008-3909

CVE-2008-3909

Description

The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
DjangoPyPI
>= 0.91.0, < 0.91.30.91.3
DjangoPyPI
>= 0.95.0, < 0.95.40.95.4
DjangoPyPI
>= 0.96.0, < 0.96.30.96.3

Affected products

1

Patches

3
44debfeaa447

Security fix. Announcement forthcoming.

https://github.com/django/djangoJacob Kaplan-MossSep 2, 2008via ghsa
2 files changed · +3 40
  • django/contrib/admin/templates/admin/login.html+0 1 modified
    @@ -17,7 +17,6 @@
     <p class="aligned">
     <label for="id_password">{% trans 'Password:' %}</label> <input type="password" name="password" id="id_password" />
     <input type="hidden" name="this_is_the_login_form" value="1" />
    -<input type="hidden" name="post_data" value="{{ post_data }}" />{% comment %} <span class="help">{% trans 'Have you <a href="/password_reset/">forgotten your password</a>?' %}</span>{% endcomment %}
     </p>
     
     <div class="aligned ">
    
  • django/contrib/admin/views/decorators.py+3 39 modified
    @@ -4,42 +4,19 @@
     from django.utils import httpwrappers
     from django.utils.html import escape
     from django.utils.translation import gettext_lazy
    -import base64, datetime, md5
    -import cPickle as pickle
    +import base64, datetime
     
     ERROR_MESSAGE = gettext_lazy("Please enter a correct username and password. Note that both fields are case-sensitive.")
     LOGIN_FORM_KEY = 'this_is_the_login_form'
     
     def _display_login_form(request, error_message=''):
         request.session.set_test_cookie()
    -    if request.POST and request.POST.has_key('post_data'):
    -        # User has failed login BUT has previously saved post data.
    -        post_data = request.POST['post_data']
    -    elif request.POST:
    -        # User's session must have expired; save their post data.
    -        post_data = _encode_post_data(request.POST)
    -    else:
    -        post_data = _encode_post_data({})
         return render_to_response('admin/login', {
             'title': _('Log in'),
             'app_path': escape(request.path),
    -        'post_data': post_data,
             'error_message': error_message
         }, context_instance=DjangoContext(request))
     
    -def _encode_post_data(post_data):
    -    pickled = pickle.dumps(post_data)
    -    pickled_md5 = md5.new(pickled + SECRET_KEY).hexdigest()
    -    return base64.encodestring(pickled + pickled_md5)
    -
    -def _decode_post_data(encoded_data):
    -    encoded_data = base64.decodestring(encoded_data)
    -    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
    -    if md5.new(pickled + SECRET_KEY).hexdigest() != tamper_check:
    -        from django.core.exceptions import SuspiciousOperation
    -        raise SuspiciousOperation, "User may have tampered with session cookie."
    -    return pickle.loads(pickled)
    -
     def staff_member_required(view_func):
         """
         Decorator for views that checks that the user is logged in and is a staff
    @@ -48,18 +25,14 @@ def staff_member_required(view_func):
         def _checklogin(request, *args, **kwargs):
             if not request.user.is_anonymous() and request.user.is_staff:
                 # The user is valid. Continue to the admin page.
    -            if request.POST.has_key('post_data'):
    -                # User must have re-authenticated through a different window
    -                # or tab.
    -                request.POST = _decode_post_data(request.POST['post_data'])
                 return view_func(request, *args, **kwargs)
     
             assert hasattr(request, 'session'), "The Django admin requires session middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 'django.middleware.sessions.SessionMiddleware'."
     
             # If this isn't already the login page, display it.
             if not request.POST.has_key(LOGIN_FORM_KEY):
                 if request.POST:
    -                message = _("Please log in again, because your session has expired. Don't worry: Your submission has been saved.")
    +                message = _("Please log in again, because your session has expired.")
                 else:
                     message = ""
                 return _display_login_form(request, message)
    @@ -91,16 +64,7 @@ def _checklogin(request, *args, **kwargs):
                     request.session[users.SESSION_KEY] = user.id
                     user.last_login = datetime.datetime.now()
                     user.save()
    -                if request.POST.has_key('post_data'):
    -                    post_data = _decode_post_data(request.POST['post_data'])
    -                    if post_data and not post_data.has_key(LOGIN_FORM_KEY):
    -                        # overwrite request.POST with the saved post_data, and continue
    -                        request.POST = post_data
    -                        request.user = user
    -                        return view_func(request, *args, **kwargs)
    -                    else:
    -                        request.session.delete_test_cookie()
    -                        return httpwrappers.HttpResponseRedirect(request.path)
    +                return httpwrappers.HttpResponseRedirect(request.path)
                 else:
                     return _display_login_form(request, ERROR_MESSAGE)
     
    
7e0972bded36

Security fix. Announcement forthcoming.

https://github.com/django/djangoJacob Kaplan-MossSep 2, 2008via ghsa
2 files changed · +3 40
  • django/contrib/admin/templates/admin/login.html+0 1 modified
    @@ -19,7 +19,6 @@
       <div class="form-row">
         <label for="id_password">{% trans 'Password:' %}</label> <input type="password" name="password" id="id_password" />
         <input type="hidden" name="this_is_the_login_form" value="1" />
    -    <input type="hidden" name="post_data" value="{{ post_data }}" /> {#<span class="help">{% trans 'Have you <a href="/password_reset/">forgotten your password</a>?' %}</span>#}
       </div>
       <div class="submit-row">
         <label>&nbsp;</label><input type="submit" value="{% trans 'Log in' %}" />
    
  • django/contrib/admin/views/decorators.py+3 39 modified
    @@ -5,42 +5,19 @@
     from django.shortcuts import render_to_response
     from django.utils.html import escape
     from django.utils.translation import gettext_lazy
    -import base64, datetime, md5
    -import cPickle as pickle
    +import base64, datetime
     
     ERROR_MESSAGE = gettext_lazy("Please enter a correct username and password. Note that both fields are case-sensitive.")
     LOGIN_FORM_KEY = 'this_is_the_login_form'
     
     def _display_login_form(request, error_message=''):
         request.session.set_test_cookie()
    -    if request.POST and request.POST.has_key('post_data'):
    -        # User has failed login BUT has previously saved post data.
    -        post_data = request.POST['post_data']
    -    elif request.POST:
    -        # User's session must have expired; save their post data.
    -        post_data = _encode_post_data(request.POST)
    -    else:
    -        post_data = _encode_post_data({})
         return render_to_response('admin/login.html', {
             'title': _('Log in'),
             'app_path': escape(request.path),
    -        'post_data': post_data,
             'error_message': error_message
         }, context_instance=template.RequestContext(request))
     
    -def _encode_post_data(post_data):
    -    pickled = pickle.dumps(post_data)
    -    pickled_md5 = md5.new(pickled + settings.SECRET_KEY).hexdigest()
    -    return base64.encodestring(pickled + pickled_md5)
    -
    -def _decode_post_data(encoded_data):
    -    encoded_data = base64.decodestring(encoded_data)
    -    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
    -    if md5.new(pickled + settings.SECRET_KEY).hexdigest() != tamper_check:
    -        from django.core.exceptions import SuspiciousOperation
    -        raise SuspiciousOperation, "User may have tampered with session cookie."
    -    return pickle.loads(pickled)
    -
     def staff_member_required(view_func):
         """
         Decorator for views that checks that the user is logged in and is a staff
    @@ -49,18 +26,14 @@ def staff_member_required(view_func):
         def _checklogin(request, *args, **kwargs):
             if request.user.is_authenticated() and request.user.is_staff:
                 # The user is valid. Continue to the admin page.
    -            if request.POST.has_key('post_data'):
    -                # User must have re-authenticated through a different window
    -                # or tab.
    -                request.POST = _decode_post_data(request.POST['post_data'])
                 return view_func(request, *args, **kwargs)
     
             assert hasattr(request, 'session'), "The Django admin requires session middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 'django.contrib.sessions.middleware.SessionMiddleware'."
     
             # If this isn't already the login page, display it.
             if not request.POST.has_key(LOGIN_FORM_KEY):
                 if request.POST:
    -                message = _("Please log in again, because your session has expired. Don't worry: Your submission has been saved.")
    +                message = _("Please log in again, because your session has expired.")
                 else:
                     message = ""
                 return _display_login_form(request, message)
    @@ -93,16 +66,7 @@ def _checklogin(request, *args, **kwargs):
                     # TODO: set last_login with an event.
                     user.last_login = datetime.datetime.now()
                     user.save()
    -                if request.POST.has_key('post_data'):
    -                    post_data = _decode_post_data(request.POST['post_data'])
    -                    if post_data and not post_data.has_key(LOGIN_FORM_KEY):
    -                        # overwrite request.POST with the saved post_data, and continue
    -                        request.POST = post_data
    -                        request.user = user
    -                        return view_func(request, *args, **kwargs)
    -                    else:
    -                        request.session.delete_test_cookie()
    -                        return http.HttpResponseRedirect(request.path)
    +                return http.HttpResponseRedirect(request.path)
                 else:
                     return _display_login_form(request, ERROR_MESSAGE)
     
    
aee48854a164

Security fix. Announcement forthcoming.

https://github.com/django/djangoJacob Kaplan-MossSep 2, 2008via ghsa
2 files changed · +3 40
  • django/contrib/admin/templates/admin/login.html+0 1 modified
    @@ -19,7 +19,6 @@
       <div class="form-row">
         <label for="id_password">{% trans 'Password:' %}</label> <input type="password" name="password" id="id_password" />
         <input type="hidden" name="this_is_the_login_form" value="1" />
    -    <input type="hidden" name="post_data" value="{{ post_data }}" /> {% comment %}<span class="help">{% trans 'Have you <a href="/password_reset/">forgotten your password</a>?' %}</span>{% endcomment %}
       </div>
       <div class="submit-row">
         <label>&nbsp;</label><input type="submit" value="{% trans 'Log in' %}" />
    
  • django/contrib/admin/views/decorators.py+3 39 modified
    @@ -5,42 +5,19 @@
     from django.shortcuts import render_to_response
     from django.utils.html import escape
     from django.utils.translation import gettext_lazy
    -import base64, datetime, md5
    -import cPickle as pickle
    +import base64, datetime
     
     ERROR_MESSAGE = gettext_lazy("Please enter a correct username and password. Note that both fields are case-sensitive.")
     LOGIN_FORM_KEY = 'this_is_the_login_form'
     
     def _display_login_form(request, error_message=''):
         request.session.set_test_cookie()
    -    if request.POST and request.POST.has_key('post_data'):
    -        # User has failed login BUT has previously saved post data.
    -        post_data = request.POST['post_data']
    -    elif request.POST:
    -        # User's session must have expired; save their post data.
    -        post_data = _encode_post_data(request.POST)
    -    else:
    -        post_data = _encode_post_data({})
         return render_to_response('admin/login.html', {
             'title': _('Log in'),
             'app_path': escape(request.path),
    -        'post_data': post_data,
             'error_message': error_message
         }, context_instance=template.RequestContext(request))
     
    -def _encode_post_data(post_data):
    -    pickled = pickle.dumps(post_data)
    -    pickled_md5 = md5.new(pickled + settings.SECRET_KEY).hexdigest()
    -    return base64.encodestring(pickled + pickled_md5)
    -
    -def _decode_post_data(encoded_data):
    -    encoded_data = base64.decodestring(encoded_data)
    -    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
    -    if md5.new(pickled + settings.SECRET_KEY).hexdigest() != tamper_check:
    -        from django.core.exceptions import SuspiciousOperation
    -        raise SuspiciousOperation, "User may have tampered with session cookie."
    -    return pickle.loads(pickled)
    -
     def staff_member_required(view_func):
         """
         Decorator for views that checks that the user is logged in and is a staff
    @@ -49,18 +26,14 @@ def staff_member_required(view_func):
         def _checklogin(request, *args, **kwargs):
             if request.user.is_authenticated() and request.user.is_staff:
                 # The user is valid. Continue to the admin page.
    -            if request.POST.has_key('post_data'):
    -                # User must have re-authenticated through a different window
    -                # or tab.
    -                request.POST = _decode_post_data(request.POST['post_data'])
                 return view_func(request, *args, **kwargs)
     
             assert hasattr(request, 'session'), "The Django admin requires session middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 'django.contrib.sessions.middleware.SessionMiddleware'."
     
             # If this isn't already the login page, display it.
             if not request.POST.has_key(LOGIN_FORM_KEY):
                 if request.POST:
    -                message = _("Please log in again, because your session has expired. Don't worry: Your submission has been saved.")
    +                message = _("Please log in again, because your session has expired.")
                 else:
                     message = ""
                 return _display_login_form(request, message)
    @@ -93,16 +66,7 @@ def _checklogin(request, *args, **kwargs):
                     # TODO: set last_login with an event.
                     user.last_login = datetime.datetime.now()
                     user.save()
    -                if request.POST.has_key('post_data'):
    -                    post_data = _decode_post_data(request.POST['post_data'])
    -                    if post_data and not post_data.has_key(LOGIN_FORM_KEY):
    -                        # overwrite request.POST with the saved post_data, and continue
    -                        request.POST = post_data
    -                        request.user = user
    -                        return view_func(request, *args, **kwargs)
    -                    else:
    -                        request.session.delete_test_cookie()
    -                        return http.HttpResponseRedirect(request.path)
    +                return http.HttpResponseRedirect(request.path)
                 else:
                     return _display_login_form(request, ERROR_MESSAGE)
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

17

News mentions

0

No linked articles in our index yet.