Lucene search

K
cveRedhatCVE-2011-0696
HistoryFeb 14, 2011 - 9:00 p.m.

CVE-2011-0696

2011-02-1421:00:03
CWE-352
redhat
web.nvd.nist.gov
92
cve-2011-0696
django
http request validation
cross-site request forgery
csrf
ajax requests

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.6

Confidence

Low

EPSS

0.004

Percentile

73.1%

Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a β€œcombination of browser plugins and redirects,” a related issue to CVE-2011-0447.

Affected configurations

Nvd
Node
djangoprojectdjangoMatch1.1
OR
djangoprojectdjangoMatch1.1.0
OR
djangoprojectdjangoMatch1.1.2
OR
djangoprojectdjangoMatch1.1.3
Node
djangoprojectdjangoMatch1.2
OR
djangoprojectdjangoMatch1.2.1
OR
djangoprojectdjangoMatch1.2.2
OR
djangoprojectdjangoMatch1.2.3
OR
djangoprojectdjangoMatch1.2.4
VendorProductVersionCPE
djangoprojectdjango1.1.0cpe:/a:djangoproject:django:1.1.0:::
djangoprojectdjango1.1cpe:/a:djangoproject:django:1.1:::
djangoprojectdjango1.1.2cpe:/a:djangoproject:django:1.1.2:::
djangoprojectdjango1.1.3cpe:/a:djangoproject:django:1.1.3:::

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.6

Confidence

Low

EPSS

0.004

Percentile

73.1%