5.8
CVSSv2

CVE-2011-4136

Published: 19/10/2011 Updated: 18/01/2018
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

django.contrib.sessions in Django prior to 1.2.7 and 1.3.x prior to 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote malicious users to modify a session by triggering use of a key that is equal to that session's identifier.

Vulnerable Product Search on Vulmon Subscribe to Product

djangoproject django 1.2.1

djangoproject django 1.1.2

djangoproject django 1.0.2

djangoproject django

djangoproject django 0.95

djangoproject django 0.95.1

djangoproject django 1.2.3

djangoproject django 1.1.0

djangoproject django 1.2.4

djangoproject django 1.2.5

djangoproject django 1.1

djangoproject django 1.0

djangoproject django 1.3

djangoproject django 1.2

djangoproject django 1.1.3

djangoproject django 0.91

djangoproject django 1.2.2

djangoproject django 1.0.1

djangoproject django 0.96

Vendor Advisories

Applications using Django could be made to crash or expose sensitive information ...
Paul McMillan, Mozilla and the Django core team discovered several vulnerabilities in Django, a Python web framework: CVE-2011-4136 When using memory-based sessions and caching, Django sessions are stored directly in the root namespace of the cache When user data is stored in the same cache, a remote user may take over a session CVE-2011-4 ...