CVE-2014-0482: Django Middleware Enables Session Hijacking
(updated )
The contrib.auth.middleware.RemoteUserMiddleware
middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend
backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER
header.
References
- github.com/advisories/GHSA-625g-gx8c-xcmg
- github.com/django/django
- github.com/django/django/blob/aa3cb3f37265be37d892e2b391ff023e9caee2a4/docs/releases/1.5.9.txt
- github.com/django/django/commit/0268b855f9eab3377f2821164ef3e66037789e09
- github.com/django/django/commit/5307ce565fbedb9cc27cbe7c757b41a00438d37c
- github.com/django/django/commit/c9e3b9949cd55f090591fbdc4a114fcb8368b6d9
- github.com/django/django/commit/dd68f319b365f6cb38c5a6c106faf4f6142d7d88
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-6.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-0482
- www.djangoproject.com/weblog/2014/aug/20/security
Detect and mitigate CVE-2014-0482 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →