Lucene search

K
githubGitHub Advisory DatabaseGHSA-5J2H-H5HG-3WF8
HistoryJul 23, 2018 - 7:51 p.m.

Cross-site request forgery in Django

2018-07-2319:51:10
CWE-352
GitHub Advisory Database
github.com
13

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.3 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

73.1%

Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a β€œcombination of browser plugins and redirects,” a related issue to CVE-2011-0447.

Affected configurations

Vulners
Node
django-registration_projectdjango-registrationRange<1.2.5django
OR
django-registration_projectdjango-registrationRange<1.1.4django
CPENameOperatorVersion
djangolt1.2.5
djangolt1.1.4

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.3 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

73.1%