| Vulnerability Name: | CVE-2008-3909 (CCN-44906) | ||||||||||||||||
| Assigned: | 2008-09-02 | ||||||||||||||||
| Published: | 2008-09-02 | ||||||||||||||||
| Updated: | 2011-03-08 | ||||||||||||||||
| Summary: | The administration application in Django 0.91, 0.95, and 0.96 stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests. | ||||||||||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||
| CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P/E:H/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||||||||||
| Vulnerability Type: | CWE-352 | ||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2008-3909 Source: OSVDB Type: UNKNOWN 47906 Source: CCN Type: SA31729 Django Authentication Cross-Site Request Forgery Source: SECUNIA Type: UNKNOWN 31837 Source: SECUNIA Type: UNKNOWN 31961 Source: DEBIAN Type: UNKNOWN DSA-1640 Source: DEBIAN Type: DSA-1640 python-django -- several vulnerabilities Source: CCN Type: Django Web site Security fix released Source: CONFIRM Type: Patch http://www.djangoproject.com/weblog/2008/sep/02/security/ Source: MLIST Type: UNKNOWN [oss-security] 20080903 django CSRF vuln Source: CCN Type: OSVDB ID: 47906 Django Administration Application CSRF Source: CCN Type: OSVDB ID: 48046 Django Administration Application Unauthenticated HTTP POST Request Handling CSRF Source: VUPEN Type: UNKNOWN ADV-2008-2533 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=460966 Source: XF Type: UNKNOWN django-administration-csrf(44906) Source: FEDORA Type: UNKNOWN FEDORA-2008-7288 Source: FEDORA Type: UNKNOWN FEDORA-2008-7672 | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||