CVE-2015-3982: Django allows user sessions hijacking via an empty string in the session key
(updated )
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
References
- github.com/advisories/GHSA-6wgp-fwfm-mxp3
- github.com/django/django
- github.com/django/django/commit/31cb25adecba930bdeee4556709f5a1c42d88fd6
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-19.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-3982
- web.archive.org/web/20200228092138/http://www.securityfocus.com/bid/74960
- www.djangoproject.com/weblog/2015/may/20/security-release
Detect and mitigate CVE-2015-3982 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →