1. ============================
    
  2. Django 2.1.9 release notes
    
  3. ============================
    
  4. 
    
  5. *June 3, 2019*
    
  6. 
    
  7. Django 2.1.9 fixes security issues in 2.1.8.
    
  8. 
    
  9. CVE-2019-12308: AdminURLFieldWidget XSS
    
  10. ---------------------------------------
    
  11. 
    
  12. The clickable "Current URL" link generated by ``AdminURLFieldWidget`` displayed
    
  13. the provided value without validating it as a safe URL. Thus, an unvalidated
    
  14. value stored in the database, or a value provided as a URL query parameter
    
  15. payload, could result in an clickable JavaScript link.
    
  16. 
    
  17. ``AdminURLFieldWidget`` now validates the provided value using
    
  18. :class:`~django.core.validators.URLValidator` before displaying the clickable
    
  19. link. You may customize the validator by passing a ``validator_class`` kwarg to
    
  20. ``AdminURLFieldWidget.__init__()``, e.g. when using
    
  21. :attr:`~django.contrib.admin.ModelAdmin.formfield_overrides`.
    
  22. 
    
  23. Patched bundled jQuery for CVE-2019-11358: Prototype pollution
    
  24. --------------------------------------------------------------
    
  25. 
    
  26. jQuery before 3.4.0, mishandles ``jQuery.extend(true, {}, ...)`` because of
    
  27. ``Object.prototype`` pollution. If an unsanitized source object contained an
    
  28. enumerable ``__proto__`` property, it could extend the native
    
  29. ``Object.prototype``.
    
  30. 
    
  31. The bundled version of jQuery used by the Django admin has been patched to
    
  32. allow for the ``select2`` library's use of ``jQuery.extend()``.