7.8
CVSSv2

CVE-2015-5143

Published: 14/07/2015 Updated: 22/09/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The session backends in Django prior to 1.4.21, 1.5.x up to and including 1.6.x, 1.7.x prior to 1.7.9, and 1.8.x prior to 1.8.3 allows remote malicious users to cause a denial of service (session store consumption) via multiple requests with unique session keys.

Vulnerable Product Search on Vulmon Subscribe to Product

djangoproject django 1.7

djangoproject django 1.7.3

djangoproject django 1.7.4

djangoproject django 1.6.7

djangoproject django 1.6.6

djangoproject django 1.6

djangoproject django 1.5.6

djangoproject django 1.5.5

djangoproject django 1.5

djangoproject django 1.7.5

djangoproject django 1.7.6

djangoproject django 1.7.7

djangoproject django 1.6.5

djangoproject django 1.6.4

djangoproject django 1.5.4

djangoproject django 1.5.3

djangoproject django 1.5.2

djangoproject django 1.4.20

djangoproject django 1.8.2

djangoproject django 1.8.1

djangoproject django 1.7.8

djangoproject django 1.7.9

djangoproject django 1.6.3

djangoproject django 1.6.2

djangoproject django 1.5.9

djangoproject django 1.5.12

djangoproject django 1.5.11

djangoproject django 1.8.0

djangoproject django 1.7.1

djangoproject django 1.7.2

djangoproject django 1.6.9

djangoproject django 1.6.8

djangoproject django 1.6.10

djangoproject django 1.6.1

djangoproject django 1.5.8

djangoproject django 1.5.7

djangoproject django 1.5.10

djangoproject django 1.5.1

debian debian linux 7.0

debian debian linux 8.0

oracle solaris 11.3

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

canonical ubuntu linux 15.10

Vendor Advisories

Several security issues were fixed in Django ...
A flaw was found in the Django session backend, which could allow an unauthenticated attacker to create session records in the configured session store, causing a denial of service by filling up the session store ...