Cross-site Request Forgery (CSRF) Affecting django package, versions [,1.4.11)[1.5,1.5.6)[1.6,1.6.3)[1.7,1.7.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.52% (78th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DJANGO-40026
  • published23 Apr 2014
  • disclosed23 Apr 2014
  • creditPaul McMillan

Introduced: 23 Apr 2014

CVE-2014-0473  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade to versions 1.7b2, 1.6.3, 1.5.6, 1.4.11 or greater.

Overview

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) attacks. The caching framework reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.

CVSS Scores

version 3.1