CVE-2020-25626

A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:encode:django_rest_framework:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:18

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1878635 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1878635 - Issue Tracking, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20201016-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20201016-0003/ - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5186 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5186 - Third Party Advisory

Information

Published : 2020-09-30 20:15

Updated : 2024-11-21 05:18


NVD link : CVE-2020-25626

Mitre link : CVE-2020-25626

CVE.ORG link : CVE-2020-25626


JSON object : View

Products Affected

redhat

  • ceph_storage

debian

  • debian_linux

encode

  • django_rest_framework
CWE
CWE-20

Improper Input Validation

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')