Privilege Escalation Affecting django package, versions [2.1,2.1.15)[2.2,2.2.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.24% (63rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Privilege Escalation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-DJANGO-536439
  • published2 Dec 2019
  • disclosed2 Dec 2019
  • creditUnknown

Introduced: 2 Dec 2019

CVE-2019-19118  (opens in a new tab)
CWE-269  (opens in a new tab)

How to fix?

Upgrade Django to version 2.1.15, 2.2.8 or higher.

Overview

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Privilege Escalation. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked.

CVSS Scores

version 3.1