6.8
CVSSv2

CVE-2011-0696

Published: 14/02/2011 Updated: 11/03/2011
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Django 1.1.x prior to 1.1.4 and 1.2.x prior to 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote malicious users to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

djangoproject django 1.1.2

djangoproject django 1.1.3

djangoproject django 1.1

djangoproject django 1.1.0

djangoproject django 1.2.1

djangoproject django 1.2.2

djangoproject django 1.2.3

djangoproject django 1.2.4

djangoproject django 1.2

Vendor Advisories

Attackers could use Django to perform web-based attacks ...
Several vulnerabilities were discovered in the Django web development framework: CVE-2011-0696 For several reasons the internal CSRF protection was not used to validate AJAX requests in the past However, it was discovered that this exception can be exploited with a combination of browser plugins and redirects and thus is not suffi ...