CVE-2020-25626

A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:encode:django_rest_framework:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-30 20:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-25626

Mitre link : CVE-2020-25626

CVE.ORG link : CVE-2020-25626


JSON object : View

Products Affected

redhat

  • ceph_storage

debian

  • debian_linux

encode

  • django_rest_framework
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-20

Improper Input Validation