6.5 Medium
AI Score
Confidence
Low
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.038 Low
EPSS
Percentile
91.7%
Pall McMillan discovered that Django used the root namespace when storing
cached session data. A remote attacker could exploit this to modify
sessions. (CVE-2011-4136)
Paul McMillan discovered that Django would not timeout on arbitrary URLs
when the application used URLFields. This could be exploited by a remote
attacker to cause a denial of service via resource exhaustion.
(CVE-2011-4137)
Paul McMillan discovered that while Django would check the validity of a
URL via a HEAD request, it would instead use a GET request for the target
of a redirect. This could potentially be used to trigger arbitrary GET
requests via a crafted Location header. (CVE-2011-4138)
It was discovered that Django would sometimes use a request’s HTTP Host
header to construct a full URL. A remote attacker could exploit this to
conduct host header cache poisoning attacks via a crafted request.
(CVE-2011-4139)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 11.10 | noarch | python-django | < 1.3-2ubuntu1.1 | UNKNOWN |
Ubuntu | 11.10 | noarch | python-django-doc | < 1.3-2ubuntu1.1 | UNKNOWN |
Ubuntu | 11.04 | noarch | python-django | < 1.2.5-1ubuntu1.1 | UNKNOWN |
Ubuntu | 11.04 | noarch | python-django-doc | < 1.2.5-1ubuntu1.1 | UNKNOWN |
Ubuntu | 10.10 | noarch | python-django | < 1.2.3-1ubuntu0.2.10.10.3 | UNKNOWN |
Ubuntu | 10.10 | noarch | python-django-doc | < 1.2.3-1ubuntu0.2.10.10.3 | UNKNOWN |
Ubuntu | 10.04 | noarch | python-django | < 1.1.1-2ubuntu1.4 | UNKNOWN |
Ubuntu | 10.04 | noarch | python-django-doc | < 1.1.1-2ubuntu1.4 | UNKNOWN |