[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-0696

Date: (C)2011-02-14   (M)2015-12-16
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.

Reference:
SECUNIA-43230
SECUNIA-43297
SECUNIA-43382
SECUNIA-43426
BID-46296
ADV-2011-0372
ADV-2011-0388
ADV-2011-0429
ADV-2011-0439
ADV-2011-0441
DSA-2163
FEDORA-2011-1235
FEDORA-2011-1261
MDVSA-2011:031
USN-1066-1
http://openwall.com/lists/oss-security/2011/02/09/6
http://www.djangoproject.com/weblog/2011/feb/08/security/
https://bugzilla.redhat.com/show_bug.cgi?id=676357

CPE    6
cpe:/a:djangoproject:django:1.2
cpe:/a:djangoproject:django:1.1.2
cpe:/a:djangoproject:django:1.1.3
cpe:/a:djangoproject:django:1.2.4
...
CWE    1
CWE-352
OVAL    6
oval:org.secpod.oval:def:300410
oval:org.secpod.oval:def:101236
oval:org.secpod.oval:def:700236
oval:org.secpod.oval:def:600173
...

© 2013 SecPod Technologies