Session Hijacking Affecting django package, versions [1.8,1.8.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.19% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DJANGO-40325
  • published20 May 2015
  • disclosed20 May 2015
  • creditUnknown

Introduced: 20 May 2015

CVE-2015-3982  (opens in a new tab)
CWE-384  (opens in a new tab)

Overview

django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Session Hijacking. The session.flush function in the cached_db backend did not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.

CVSS Scores

version 3.1