Web Cache Poisoning Affecting django package, versions [,1.4.13)[1.5,1.5.8)[1.6,1.6.5)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.6% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DJANGO-40256
  • published14 May 2014
  • disclosed14 May 2014
  • creditSeth Arnold, Michael Nelson, Natalia Bidart, James Westby

Introduced: 14 May 2014

CVE-2014-1418  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade Django to version 1.4.13, 1.5.8, 1.6.5 or higher.

Overview

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Web Cache Poisoning. It does not properly include the Vary: Cookie or Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.

CVSS Scores

version 3.1