The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2038.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2039.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2040.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2041.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2042.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2043.html - | |
References | () http://www.debian.org/security/2016/dsa-3678 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/93182 - Third Party Advisory | |
References | () http://www.securitytracker.com/id/1036899 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3089-1 - Third Party Advisory | |
References | () https://www.djangoproject.com/weblog/2016/sep/26/security-releases/ - Patch, Vendor Advisory |
Information
Published : 2016-10-03 18:59
Updated : 2024-11-21 02:57
NVD link : CVE-2016-7401
Mitre link : CVE-2016-7401
CVE.ORG link : CVE-2016-7401
JSON object : View
Products Affected
canonical
- ubuntu_linux
djangoproject
- django
debian
- debian_linux
CWE
CWE-254
7PK - Security Features