Lucene search

K
githubGitHub Advisory DatabaseGHSA-RW75-M7GP-92M3
HistoryMay 14, 2022 - 2:09 a.m.

Django data leakage via querystring manipulation in admin

2022-05-1402:09:22
CWE-200
GitHub Advisory Database
github.com
5

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

5.8 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

58.8%

The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.

Affected configurations

Vulners
Node
django-registration_projectdjango-registrationRange<1.7c3django
OR
django-registration_projectdjango-registrationRange<1.6.6django
OR
django-registration_projectdjango-registrationRange<1.5.9django
OR
django-registration_projectdjango-registrationRange<1.4.14django
CPENameOperatorVersion
djangolt1.7c3
djangolt1.6.6
djangolt1.5.9
djangolt1.4.14

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

5.8 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

58.8%