Content Spoofing Affecting django package, versions [,1.11.18)[2.0.0, 2.0.10)[2.1.0, 2.1.5)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DJANGO-72888
  • published8 Jan 2019
  • disclosed4 Jan 2019
  • creditJerbi Nessim

Introduced: 4 Jan 2019

CVE-2019-3498  (opens in a new tab)
CWE-148  (opens in a new tab)

How to fix?

Upgrade Django to version 1.11.18, 2.0.10, 2.1.5 or higher.

Overview

Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Content Spoofing. The default 404 page did not properly handle user-supplied data, an attacker could supply content to the web application, typically via a parameter value, that is reflected back to the user. This presented the user with a modified page under the context of the trusted domain.

CVSS Scores

version 3.1