CVE-2015-5963

Related Vulnerabilities: CVE-2015-5963  

It was found that Django incorrectly handled the session store. A session could be created by anonymously accessing the django.contrib.auth.views.logout view if it was not decorated correctly with django.contrib.auth.decorators.login_required. A remote attacker could use this flaw to fill up the session store or cause other users' session records to be evicted by requesting a large number of new sessions.

It was found that Django incorrectly handled the session store. A session could be created by anonymously accessing the django.contrib.auth.views.logout view if it was not decorated correctly with django.contrib.auth.decorators.login_required. A remote attacker could use this flaw to fill up the session store or cause other users' session records to be evicted by requesting a large number of new sessions.

Find out more about CVE-2015-5963 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 (python-django) RHSA-2015:1894 2015-10-15
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (python-django) RHSA-2015:1767 2015-09-10
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 (python-django) RHSA-2015:1766 2015-09-10
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 (python-django) RHSA-2015:1876 2015-10-08

Acknowledgements

Red Hat would like to thank the upstream Django project for reporting this issue.