Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-48432

Опубликовано: 05 июн. 2025
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed3:4.2.23-1package

Примечания

  • https://www.djangoproject.com/weblog/2025/jun/04/security-releases/

  • Fixed by: https://github.com/django/django/commit/ac03c5e7df8680c61cdb0d3bdb8be9095dba841e (4.2.22)

  • Initial 4.2.22 release didn't fix it fully: https://www.djangoproject.com/weblog/2025/jun/10/bugfix-releases/

  • Follow up: https://github.com/django/django/commit/b597d46bb19c8567615e62029210dab16c70db7d (4.2.23)

EPSS

Процентиль: 11%
0.00039
Низкий

Связанные уязвимости

CVSS3: 4
ubuntu
около 2 месяцев назад

An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.

CVSS3: 5.4
redhat
около 2 месяцев назад

An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.

CVSS3: 4
nvd
около 2 месяцев назад

An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.

suse-cvrf
26 дней назад

Security update for python-Django

suse-cvrf
около 2 месяцев назад

Security update for python-Django

EPSS

Процентиль: 11%
0.00039
Низкий