Lucene search

K
githubGitHub Advisory DatabaseGHSA-7QFW-J7HP-V45G
HistoryMay 17, 2022 - 3:20 a.m.

Django WSGI Header Spoofing Vulnerability

2022-05-1703:20:54
CWE-290
GitHub Advisory Database
github.com
8
django
wsgi
spoofing
vulnerability
remote attackers
http header
x-auth_user

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.008

Percentile

82.2%

Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.

Affected configurations

Vulners
Node
djangoRange1.71.7.3
OR
djangoRange1.61.6.10
OR
djangoRange<1.4.18
VendorProductVersionCPE
*django*cpe:2.3:a:*:django:*:*:*:*:*:*:*:*

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.008

Percentile

82.2%