django is vulnerable to cross-site scripting (XSS). The vulnerability exists as the value of params
, used in get_context
, in admin.widgets.py
is not properly sanitized.
CPE | Name | Operator | Version |
---|---|---|---|
django | le | 3.0.6 | |
django | le | 2.2.12 | |
py3-django:edge | eq | 1.11.28-r0 | |
py3-django:edge | eq | 1.11.29-r0 | |
django | le | 3.0.6 | |
django | le | 2.2.12 | |
py3-django:edge | eq | 1.11.28-r0 | |
py3-django:edge | eq | 1.11.29-r0 |
django.readthedocs.io/en/latest/releases/security.html#june-3-2020-cve-2020-13596
docs.djangoproject.com/en/3.0/releases/security/
github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815
groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
lists.fedoraproject.org/archives/list/[email protected]/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
security.netapp.com/advisory/ntap-20200611-0002/
usn.ubuntu.com/4381-1/
usn.ubuntu.com/4381-2/
www.debian.org/security/2020/dsa-4705
www.djangoproject.com/weblog/2020/jun/03/security-releases/
www.oracle.com/security-alerts/cpujan2021.html