Lucene search

K
githubGitHub Advisory DatabaseGHSA-6WGP-FWFM-MXP3
HistoryMay 17, 2022 - 3:29 a.m.

Django allows user sessions hijacking via an empty string in the session key

2022-05-1703:29:56
GitHub Advisory Database
github.com
6

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

56.7%

The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.

Affected configurations

Vulners
Node
django-registration_projectdjango-registrationRange<1.8.2django
CPENameOperatorVersion
djangolt1.8.2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

56.7%