Session Manipulation Affecting django package, versions [,1.2.7)[1.3,1.3.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.85% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Session Manipulation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-DJANGO-40079
  • published11 Sept 2011
  • disclosed11 Sept 2011
  • creditPaul McMillan

Introduced: 11 Sep 2011

CVE-2011-4136  (opens in a new tab)
CWE-20  (opens in a new tab)

Overview

django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Session Manipulation. It stored session data in the cache using the root namespace for both session identifiers and application-data keys. This allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.

CVSS Scores

version 3.1