CVE-2008-3909: Django cross-site request forgery (CSRF) vulnerability
(updated )
The administration application in Django 0.91.x, 0.95.x, and 0.96.x stores unauthenticated HTTP POST requests and processes them after successful authentication occurs, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete or modify data via unspecified requests.
References
- bugzilla.redhat.com/show_bug.cgi?id=460966
- github.com/advisories/GHSA-r5cj-wv24-92p5
- github.com/django/django
- github.com/django/django/commit/44debfeaa4473bd28872c735dd3d9afde6886752
- github.com/django/django/commit/7e0972bded362bc4b851c109df2c8a6548481a8e
- github.com/django/django/commit/aee48854a164382c655acb9f18b3c06c3d238e81
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2008-2.yaml
- nvd.nist.gov/vuln/detail/CVE-2008-3909
- www.redhat.com/archives/fedora-package-announce/2008-September/msg00091.html
- www.redhat.com/archives/fedora-package-announce/2008-September/msg00131.html
Detect and mitigate CVE-2008-3909 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →