Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-5828

Опубликовано: 05 нояб. 2007
Источник: debian
EPSS Низкий

Описание

Cross-site request forgery (CSRF) vulnerability in the admin panel in Django 0.96 allows remote attackers to change passwords of arbitrary users via a request to admin/auth/user/1/password/. NOTE: this issue has been disputed by Debian, since product documentation includes a recommendation for a CSRF protection module that is included with the product. However, CVE considers this an issue because the default configuration does not use this module

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed1.2.1package

Примечания

  • this is documented in docs/csrf.txt included in the python-django package and

  • there is a plugin enabling this feature. This is intended behaviour pre-1.2.

  • https://docs.djangoproject.com/en/1.10/ref/csrf/#using-csrf

EPSS

Процентиль: 40%
0.00174
Низкий

Связанные уязвимости

redhat
больше 17 лет назад

Cross-site request forgery (CSRF) vulnerability in the admin panel in Django 0.96 allows remote attackers to change passwords of arbitrary users via a request to admin/auth/user/1/password/. NOTE: this issue has been disputed by Debian, since product documentation includes a recommendation for a CSRF protection module that is included with the product. However, CVE considers this an issue because the default configuration does not use this module

nvd
больше 17 лет назад

Cross-site request forgery (CSRF) vulnerability in the admin panel in Django 0.96 allows remote attackers to change passwords of arbitrary users via a request to admin/auth/user/1/password/. NOTE: this issue has been disputed by Debian, since product documentation includes a recommendation for a CSRF protection module that is included with the product. However, CVE considers this an issue because the default configuration does not use this module

github
около 3 лет назад

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the admin panel in Django 0.96 allows remote attackers to change passwords of arbitrary users via a request to admin/auth/user/1/password/. NOTE: this issue has been disputed by Debian, since product documentation includes a recommendation for a CSRF protection module that is included with the product. However, CVE considers this an issue because the default configuration does not use this module.

EPSS

Процентиль: 40%
0.00174
Низкий