Lucene search

K
githubGitHub Advisory DatabaseGHSA-H582-2PCH-3XV3
HistoryJul 05, 2019 - 9:10 p.m.

Django Denial-of-service by filling session store

2019-07-0521:10:39
GitHub Advisory Database
github.com
20

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.135 Low

EPSS

Percentile

95.7%

The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.

Affected configurations

Vulners
Node
django-registration_projectdjango-registrationRange<1.8.3django
OR
django-registration_projectdjango-registrationRange<1.7.9django
OR
django-registration_projectdjango-registrationRange<1.4.21django
CPENameOperatorVersion
djangolt1.8.3
djangolt1.7.9
djangolt1.4.21

References

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.135 Low

EPSS

Percentile

95.7%