Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, an attacker could discover your ANYMAIL_WEBHOOK setting and use this to post fabricated or malicious Anymail tracking/inbound events to your app. This vulnerability appears to have been fixed in v1.4.
References
Link | Resource |
---|---|
https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef | Patch Vendor Advisory |
https://github.com/anymail/django-anymail/releases/tag/v1.4 | Release Notes |
https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef | Patch Vendor Advisory |
https://github.com/anymail/django-anymail/releases/tag/v1.4 | Release Notes |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef - Patch, Vendor Advisory | |
References | () https://github.com/anymail/django-anymail/releases/tag/v1.4 - Release Notes |
Information
Published : 2018-03-13 15:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000089
Mitre link : CVE-2018-1000089
CVE.ORG link : CVE-2018-1000089
JSON object : View
Products Affected
django-anymail_project
- django-anymail
CWE
CWE-532
Insertion of Sensitive Information into Log File