It was found that Django incorrectly handled the session store. A session could be created by anonymously accessing the django.contrib.auth.views.logout view if it was not decorated correctly with django.contrib.auth.decorators.login_required. A remote attacker could use this flaw to fill up the session store or cause other users' session records to be evicted by requesting a large number of new sessions.
Find out more about CVE-2015-5963 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 (python-django) | RHSA-2015:1894 | 2015-10-15 |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (python-django) | RHSA-2015:1767 | 2015-09-10 |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 (python-django) | RHSA-2015:1766 | 2015-09-10 |
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 (python-django) | RHSA-2015:1876 | 2015-10-08 |