CVE-2011-0696: Cross-site request forgery in Django
(updated )
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a “combination of browser plugins and redirects,” a related issue to CVE-2011-0447.
References
- bugzilla.redhat.com/show_bug.cgi?id=676357
- github.com/advisories/GHSA-5j2h-h5hg-3wf8
- github.com/django/django
- github.com/django/django/commit/408c5c873ce1437c7eee9544ff279ecbad7e150a
- github.com/django/django/commit/818e70344e7193f6ebc73c82ed574e6ce3c91afc
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2011-10.yaml
- nvd.nist.gov/vuln/detail/CVE-2011-0696
Detect and mitigate CVE-2011-0696 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →