Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SNYK: MEDIUM] Web Cache Poisoning (Due: 4/25/2021) #4426

Closed
patphongs opened this issue Feb 24, 2021 · 0 comments · Fixed by #4518
Closed

[SNYK: MEDIUM] Web Cache Poisoning (Due: 4/25/2021) #4426

patphongs opened this issue Feb 24, 2021 · 0 comments · Fixed by #4518
Assignees
Labels
Security: moderate Remediate within 60 days
Milestone

Comments

@patphongs
Copy link
Member

django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Web Cache Poisoning. Django contains a copy of urllib.parse.parse_qsl() which was added to backport some security fixes. A further security fix has been issued recently such that parse_qsl() no longer allows using ; as a query parameter separator by default.

Remediation
Upgrade django to version 2.2.19, 3.0.13, 3.1.7 or higher.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Security: moderate Remediate within 60 days
Projects
None yet
2 participants