logo

CVE-2015-3982 django

Package

Manager: pip
Name: django
Vulnerable Version: >=1.8a1 <1.8.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U

EPSS: 0.00322 pctl0.54584

Details

Django allows user sessions hijacking via an empty string in the session key The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.

Metadata

Created: 2022-05-17T03:29:56Z
Modified: 2024-09-17T15:10:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6wgp-fwfm-mxp3/GHSA-6wgp-fwfm-mxp3.json
CWE IDs: ["CWE-384"]
Alternative ID: GHSA-6wgp-fwfm-mxp3
Finding: F280
Auto approve: 1