Vulnerability Name: | CVE-2020-25626 (CCN-189365) | ||||||||||||||||||||||||||||||||
Assigned: | 2020-09-30 | ||||||||||||||||||||||||||||||||
Published: | 2020-09-30 | ||||||||||||||||||||||||||||||||
Updated: | 2022-09-28 | ||||||||||||||||||||||||||||||||
Summary: | A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
6.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-25626 Source: CCN Type: Red Hat Bugzilla Bug 1878635 (CVE-2020-25626) - CVE-2020-25626 django-rest-framework: XSS Vulnerability in API viewer Source: MISC Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1878635 Source: XF Type: UNKNOWN django-cve202025626-xss(189365) Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20201016-0003/ Source: DEBIAN Type: Third Party Advisory DSA-5186 Source: CCN Type: Django Web site Django REST framework is a powerful and flexible toolkit for building Web APIs. Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-25626 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |