First published: Wed Jun 03 2020(Updated: )
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Django | >=2.2<2.2.13 | |
Djangoproject Django | >=3.0<3.0.7 | |
Fedoraproject Fedora | =32 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
Netapp Sra Plugin | ||
Netapp Steelstore Cloud Integrated Storage | ||
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
debian/python-django | 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:4.2.16-1 | |
pip/Django | >=3.0a1<3.0.7 | 3.0.7 |
pip/Django | >=2.2a1<2.2.13 | 2.2.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13596 is an issue discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7 that allows for the possibility of an XSS attack.
The severity of CVE-2020-13596 is medium with a CVSS score of 6.1.
CVE-2020-13596 affects Django versions 2.2 before 2.2.13 and 3.0 before 3.0.7.
To fix CVE-2020-13596, upgrade Django to version 2.2.13 or 3.0.7.
You can find more information about CVE-2020-13596 on the CVE Mitre website and the Ubuntu Security Notices: USN-4381-1 and USN-4381-2.