Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-6949DF149043EC2EC5BE2DF2AD7C5DE4
HistoryJul 23, 2018 - 12:00 a.m.

Cross-Site Request Forgery

2018-07-2300:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
15

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.1%

Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery attacks via forged AJAX requests that leverage a β€œcombination of browser plugins and redirects,” a related issue to CVE-2011-0447.

Affected configurations

Vulners
Node
pypidjango-navbar-clientRange1.1.0β‰₯pypi
OR
pypidjango-navbar-clientRange<1.1.4pypi
OR
pypidjango-navbar-clientRange1.2.0β‰₯pypi
OR
pypidjango-navbar-clientRange<1.2.5pypi

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.1%