Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-675q-g72p-gc3c

Опубликовано: 10 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170

Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170

EPSS

Процентиль: 88%
0.03878
Низкий

Дефекты

CWE-116

Связанные уязвимости

CVSS3: 5.3
nvd
около 4 лет назад

Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170

EPSS

Процентиль: 88%
0.03878
Низкий

Дефекты

CWE-116