5
CVSSv2

CVE-2011-4139

Published: 19/10/2011 Updated: 18/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Django prior to 1.2.7 and 1.3.x prior to 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote malicious users to conduct cache poisoning attacks via a crafted request.

Vulnerable Product Search on Vulmon Subscribe to Product

djangoproject django 1.1

djangoproject django 1.0

djangoproject django 1.3

djangoproject django 1.2

djangoproject django 0.91

djangoproject django 1.2.2

djangoproject django 1.0.1

djangoproject django 0.96

djangoproject django 0.95

djangoproject django 0.95.1

djangoproject django 1.2.3

djangoproject django 1.1.0

djangoproject django 1.1.3

djangoproject django 1.2.4

djangoproject django 1.2.5

djangoproject django 1.2.1

djangoproject django 1.1.2

djangoproject django 1.0.2

djangoproject django

Vendor Advisories

Applications using Django could be made to crash or expose sensitive information ...
Paul McMillan, Mozilla and the Django core team discovered several vulnerabilities in Django, a Python web framework: CVE-2011-4136 When using memory-based sessions and caching, Django sessions are stored directly in the root namespace of the cache When user data is stored in the same cache, a remote user may take over a session CVE-2011-4 ...