Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-3902

Опубликовано: 07 апр. 2026
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A flaw was found in Django. A remote attacker can exploit an ambiguous mapping of header variants (with hyphens or underscores) to a single version with underscores in ASGIRequest. This vulnerability allows the attacker to spoof headers, potentially leading to unauthorized actions or misdirection within the application.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2automation-controllerFix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/automation-reportsFix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/controller-rhel9Fix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/eda-controller-rhel9Fix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/gateway-rhel9Fix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/hub-rhel9Fix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/lightspeed-rhel8Fix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/lightspeed-rhel9Fix deferred
Red Hat Ansible Automation Platform 2redhat-user-workloads/metrics-service-rhel9Fix deferred
Red Hat Discovery 2redhat-user-workloads/discovery-serverFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2455935Django: Django: Header spoofing via ambiguous header mapping

EPSS

Процентиль: 11%
0.00036
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
8 дней назад

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. `ASGIRequest` allows a remote attacker to spoof headers by exploiting an ambiguous mapping of two header variants (with hyphens or with underscores) to a single version with underscores. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.

CVSS3: 7.5
nvd
8 дней назад

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. `ASGIRequest` allows a remote attacker to spoof headers by exploiting an ambiguous mapping of two header variants (with hyphens or with underscores) to a single version with underscores. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.

CVSS3: 7.5
debian
8 дней назад

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4. ...

CVSS3: 7.5
github
8 дней назад

Django vulnerable to ASGI header spoofing via underscore/hyphen conflation

EPSS

Процентиль: 11%
0.00036
Низкий

5.3 Medium

CVSS3