djangorestframework@0.3.0 vulnerabilities

Web APIs for Django, made easy.

Direct Vulnerabilities

Known vulnerabilities in the djangorestframework package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

djangorestframework is a powerful and flexible toolkit for building Web APIs.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 3.15.2 or higher.

[,3.15.2)
  • M
Cross-site Scripting (XSS)

djangorestframework is a powerful and flexible toolkit for building Web APIs.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 3.11.2 or higher.

[,3.11.2)
  • M
Cross-site Scripting (XSS)

djangorestframework is a powerful and flexible toolkit for building Web APIs.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to disabled autoescaping in the default DRF Browsable API view templates.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 3.9.1 or higher.

[,3.9.1)
  • M
Cross-site Scripting (XSS)

Affected versions of djangorestframework are vulnerable to Cross-Site Scripting (XSS) attacks.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 2.3.14 or higher.

[,2.3.14)
  • M
Information Exposure

Affected versions of djangorestframework are vulnerable to Information Exposure.

OrderingField allows ordering on any fields, which an malicious attacker can exploit and ordering fields that are not visible and get sensitive data.

How to fix Information Exposure?

Upgrade djangorestframework to version 2.3.12 or higher.

[,2.3.12)
  • H
XML External Entity (XXE) Injection

Affected versions of djangorestframework are vulnerable to XML External Entity (XXE) Injection which happens because xml.etree.ElementTree in not secured against XXE injections.

How to fix XML External Entity (XXE) Injection?

Upgrade djangorestframework to version 2.2.1 or higher.

[,2.2.1)
  • M
Cross-site Scripting (XSS)

Affected versions of djangorestframework are vulnerable to Cross-Site Scripting (XSS) attacks.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 2.4.4 or higher.

[,2.4.4)