logo

CVE-2018-1000089 django-anymail

Package

Manager: pip
Name: django-anymail
Vulnerable Version: >=0.2 <1.4

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00322 pctl0.54678

Details

django-anymail Includes Sensitive Information in Log Files Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, an attacker could discover your ANYMAIL_WEBHOOK setting and use this to post fabricated or malicious Anymail tracking/inbound events to your app. This vulnerability appears to have been fixed in v1.4.

Metadata

Created: 2022-05-14T03:32:28Z
Modified: 2024-11-18T16:26:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qh9x-mc42-vg4g/GHSA-qh9x-mc42-vg4g.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-qh9x-mc42-vg4g
Finding: F039
Auto approve: 1