First published: Mon Sep 14 2020(Updated: )
A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/djangorestframework | <3.11.2 | 3.11.2 |
debian/djangorestframework | 3.9.0-1+deb10u1 3.12.1-1 3.14.0-2 | |
redhat/django-rest-framework | <3.12.0 | 3.12.0 |
redhat/django-rest-framework | <3.11.2 | 3.11.2 |
Encode Django Rest Framework | <3.12.0 | |
Redhat Ceph Storage | =2.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-25626 is medium with a CVSS score of 6.1.
CVE-2020-25626 allows an attacker to inject malicious script tags by exploiting certain strings from user input.
Django REST Framework versions before 3.12.0 and before 3.11.2 are affected by CVE-2020-25626.
To fix CVE-2020-25626, update Django REST Framework to version 3.12.0 or apply the necessary patches provided by the respective package/source.
You can find more information about CVE-2020-25626 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-25626), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1878635), [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20201016-0003/).