Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5fq8-3q2f-4m5g

Опубликовано: 24 янв. 2020
Источник: github
Github: Прошло ревью
CVSS4: 4.8
CVSS3: 6.5

Описание

Session key exposure through session list in Django User Sessions

Impact

The views provided by django-user-sessions allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.

Patches

Patch is under way.

Workarounds

Remove the session_key from the template.

References

None.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

django-user-sessions

pip
Затронутые версииВерсия исправления

< 1.7.1

1.7.1

EPSS

Процентиль: 33%
0.00129
Низкий

4.8 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 6.5
nvd
около 6 лет назад

In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.

EPSS

Процентиль: 33%
0.00129
Низкий

4.8 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-287