CVE-2018-6596: Django-Anymail prone to a timing attack
(updated )
webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events.
References
- bugs.debian.org/889450
- github.com/advisories/GHSA-hxf9-7h4c-f5jv
- github.com/anymail/django-anymail
- github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b
- github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5
- github.com/anymail/django-anymail/releases/tag/v1.2.1
- github.com/anymail/django-anymail/releases/tag/v1.3
- github.com/pypa/advisory-database/tree/main/vulns/django-anymail/PYSEC-2018-7.yaml
- nvd.nist.gov/vuln/detail/CVE-2018-6596
- www.debian.org/security/2018/dsa-4107
Detect and mitigate CVE-2018-6596 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →