CVE-2014-1418: Django Vulnerable to Cache Poisoning
(updated )
Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.
References
- github.com/advisories/GHSA-q7q2-qf2q-rw3w
- github.com/django/django
- github.com/django/django/commit/1abcf3a808b35abae5d425ed4d44cb6e886dc769
- github.com/django/django/commit/28e23306aa53bbbb8fb87db85f99d970b051026c
- github.com/django/django/commit/4001ec8698f577b973c5a540801d8a0bbea1205b
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-19.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-1418
- www.djangoproject.com/weblog/2014/may/14/security-releases-issued
Detect and mitigate CVE-2014-1418 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →