Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r5cj-wv24-92p5

Опубликовано: 02 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Django cross-site request forgery (CSRF) vulnerability

The administration application in Django 0.91.x, 0.95.x, and 0.96.x stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

Пакеты

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 0.91.0, < 0.91.3

0.91.3

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 0.95.0, < 0.95.4

0.95.4

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 0.96.0, < 0.96.3

0.96.3

EPSS

Процентиль: 57%
0.00358
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

ubuntu
почти 17 лет назад

The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

nvd
почти 17 лет назад

The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.

debian
почти 17 лет назад

The administration application in Django 0.91, 0.95, and 0.96 stores u ...

EPSS

Процентиль: 57%
0.00358
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-352