-
-
Notifications
You must be signed in to change notification settings - Fork 17
CVE-2020-25626 (Medium) detected in djangorestframework-3.9.4-py2.py3-none-any.whl #103
Description
CVE-2020-25626 - Medium Severity Vulnerability
Vulnerable Library - djangorestframework-3.9.4-py2.py3-none-any.whl
Web APIs for Django, made easy.
Library home page: https://files.pythonhosted.org/packages/1b/fe/fcebec2a98fbd1548da1c12ce8d7f634a02a9cce350833fa227a625ec624/djangorestframework-3.9.4-py2.py3-none-any.whl
Path to dependency file: covidX/requirements.txt
Path to vulnerable library: covidX/requirements.txt
Dependency Hierarchy:
- drf_jwt-1.17.2-py2.py3-none-any.whl (Root Library)
- ❌ djangorestframework-3.9.4-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: 6f3dbcb5ab003a4ef1776b72be10967612787631
Vulnerability Details
A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
Publish Date: 2020-09-30
URL: CVE-2020-25626
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://pypi.org/project/djangorestframework/3.12.1/
Release Date: 2020-09-17
Fix Resolution: 3.12.1
Step up your Open Source Security Game with WhiteSource here