We've issued security releases (3.4.3 and 3.3.4) for two medium-level 
vulnerabilities.

These updates prevent:

* a potential escalation of privileges through a django CMS page's Advanced 
Settings.
* a potential phishing attack using redirects from the login form

The updated releases are now available from our GitHub repository 
<https://github.com/divio/django-cms/> and PyPI 
<https://pypi.python.org/pypi/django-cms/>.

Divio Cloud users can update their django CMS installations via the control 
panel <https://control.divio.com/>.

Please see the notes on GitHub 
<https://github.com/divio/django-cms/issues/5938>  for more details.

Thanks to Anthony Steinhauser and Mark Walker for the reports.

As ever, we remind our users and contributors that all security reports, 
patches and concerns be addressed only to our security team by email, at 
<secur...@django-cms.org>.

Please do not use GitHub, our email lists or IRC to report, address or 
otherwise discuss matters relating to security.

If you use django CMS in a critically-important application, please contact 
Divio for details of SLAs, that will give you access to patches and information 
about vulnerabilities before disclosures or releases are made public: 
<https://www.divio.com/en/solutions/enterprise-services/>.

On behalf of the team,

Daniele

-- 
Message URL: 
https://groups.google.com/d/msg/django-cms-developers/topic-id/message-id
Unsubscribe: send a message to 
django-cms-developers+unsubscr...@googlegroups.com
--- 
You received this message because you are subscribed to the Google Groups 
"django CMS developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-cms-developers+unsubscr...@googlegroups.com.
To view this discussion on the web, visit 
https://groups.google.com/d/msgid/django-cms-developers/20170426140840.569333035%40mail.gandi.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to