[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-4140

Date: (C)2011-10-19   (M)2015-12-16
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.

Reference:
SECUNIA-46614
DSA-2332
http://openwall.com/lists/oss-security/2011/09/11/1
http://openwall.com/lists/oss-security/2011/09/13/2
https://bugzilla.redhat.com/show_bug.cgi?id=737366
https://www.djangoproject.com/weblog/2011/sep/09/
https://www.djangoproject.com/weblog/2011/sep/10/127/

CPE    15
cpe:/a:djangoproject:django:0.96
cpe:/a:djangoproject:django:1.0.1
cpe:/a:djangoproject:django:0.95
cpe:/a:djangoproject:django:1.0.2
...
CWE    1
CWE-352
OVAL    1
oval:org.secpod.oval:def:600693

© 2013 SecPod Technologies