First published: Tue Jul 14 2015(Updated: )
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=1.8<1.8.3 | 1.8.3 |
pip/Django | >=1.5<1.7.9 | 1.7.9 |
pip/django | <1.4.21 | 1.4.21 |
djangoproject Django | =1.4.20 | |
djangoproject Django | =1.5 | |
djangoproject Django | =1.5-alpha | |
djangoproject Django | =1.5-beta | |
djangoproject Django | =1.5.1 | |
djangoproject Django | =1.5.2 | |
djangoproject Django | =1.5.3 | |
djangoproject Django | =1.5.4 | |
djangoproject Django | =1.5.5 | |
djangoproject Django | =1.5.6 | |
djangoproject Django | =1.5.7 | |
djangoproject Django | =1.5.8 | |
djangoproject Django | =1.5.9 | |
djangoproject Django | =1.5.10 | |
djangoproject Django | =1.5.11 | |
djangoproject Django | =1.5.12 | |
djangoproject Django | =1.6 | |
djangoproject Django | =1.6-beta1 | |
djangoproject Django | =1.6-beta2 | |
djangoproject Django | =1.6-beta3 | |
djangoproject Django | =1.6-beta4 | |
djangoproject Django | =1.6.1 | |
djangoproject Django | =1.6.2 | |
djangoproject Django | =1.6.3 | |
djangoproject Django | =1.6.4 | |
djangoproject Django | =1.6.5 | |
djangoproject Django | =1.6.6 | |
djangoproject Django | =1.6.7 | |
djangoproject Django | =1.6.8 | |
djangoproject Django | =1.6.9 | |
djangoproject Django | =1.6.10 | |
djangoproject Django | =1.7-beta1 | |
djangoproject Django | =1.7-beta2 | |
djangoproject Django | =1.7-beta3 | |
djangoproject Django | =1.7-beta4 | |
djangoproject Django | =1.7-rc1 | |
djangoproject Django | =1.7-rc2 | |
djangoproject Django | =1.7-rc3 | |
djangoproject Django | =1.7.1 | |
djangoproject Django | =1.7.2 | |
djangoproject Django | =1.7.3 | |
djangoproject Django | =1.7.4 | |
djangoproject Django | =1.7.5 | |
djangoproject Django | =1.7.6 | |
djangoproject Django | =1.7.7 | |
djangoproject Django | =1.7.8 | |
djangoproject Django | =1.7.9 | |
djangoproject Django | =1.8.0 | |
djangoproject Django | =1.8.1 | |
djangoproject Django | =1.8.2 | |
Debian | =7.0 | |
Debian | =8.0 | |
Oracle Solaris SPARC | =11.3 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5143 is classified as a high severity vulnerability due to its potential for causing a denial of service.
To fix CVE-2015-5143, upgrade Django to version 1.4.21, 1.7.9, or 1.8.3 or later.
The affected versions of Django include all versions prior to 1.4.21, 1.5.x through 1.6.x, 1.7.x prior to 1.7.9, and 1.8.x prior to 1.8.3.
CVE-2015-5143 allows remote attackers to exploit the vulnerability by making multiple requests with unique session keys to exhaust the session store.
There is no specific workaround for CVE-2015-5143; upgrading to the secure versions is recommended.