Web Cache Poisoning Affecting django package, versions [,1.2.7)[1.3,1.3.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.97% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Web Cache Poisoning vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-DJANGO-40083
  • published11 Sept 2011
  • disclosed11 Sept 2011
  • creditDjango Core Development Team

Introduced: 11 Sep 2011

CVE-2011-4139  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Django to version 1.2.7, 1.3.1 or higher.

Overview

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Web Cache Poisoning. It used a request's HTTP Host header to construct a full URL. An attacker can submit a request with a Host header of his or her choice, receive a response which constructs URLs using that Host header, and If that response is cached, further requests will be served out of cache using URLs containing the attacker's host of choice.

CVSS Scores

version 3.1