M README.md +2 -2
@@ 3,7 3,7 @@
Simple application to allow superusers to "impersonate" other non-superuser accounts.
-**Version:** 1.9.3
+**Version:** 1.9.4
**Project Links:** [Issues][issues] - [Mailing List][pinbox] -
[Contributing](#contributing)
@@ 30,7 30,7 @@ Dependencies
**NOTE:**
-- **Versions 1.9.2 and below** are vulnerable to an XSS scripting
+- **Versions 1.9.3 and below** are vulnerable to an XSS scripting
vulnerability where an attacker can craft a malicious URL and execute JS if
an authorized user clicks/follows the URL. Please upgrade to 1.9.3 or
newer.
M README.rst +2 -2
@@ 4,7 4,7 @@ django-impersonate |nlshield|
Simple application to allow superusers to "impersonate" other
non-superuser accounts.
-**Version:** 1.9.3
+**Version:** 1.9.4
**Project Links:**
`Issues <https://todo.code.netlandish.com/~petersanchez/django-impersonate>`__
@@ 31,7 31,7 @@ Dependencies
**NOTE:**
-- **Versions 1.9.2 and below** are vulnerable to an XSS scripting
+- **Versions 1.9.3 and below** are vulnerable to an XSS scripting
vulnerability where an attacker can craft a malicious URL and execute
JS if an authorized user clicks/follows the URL. Please upgrade to
1.9.3 or newer.
M impersonate/__init__.py +1 -1
@@ 1,5 1,5 @@
# -*- coding: utf-8 -*-
-VERSION = (1, 9, 3, 'final', 0)
+VERSION = (1, 9, 4, 'final', 0)
# taken from django-registration
M impersonate/helpers.py +3 -3
@@ 31,9 31,9 @@ def get_redir_field(request):
nextval = request.GET.get(redirect_field_name, None)
if nextval:
return format_html(
- u'<input type="hidden" name="{0}" value="{1}"/>'.format(
- redirect_field_name, nextval,
- )
+ u'<input type="hidden" name="{0}" value="{1}"/>',
+ redirect_field_name,
+ nextval,
)
return u''