First published: Wed Aug 12 2015(Updated: )
Following issue was reported in Django: Previously, a session could be created when anonymously accessing the ``django.contrib.auth.views.logout`` view (provided it wasn't decorated with ``django.contrib.auth.decorators.login_required`` as done in the admin). This could allow an attacker to easily create many new session records by sending repeated requests, potentially filling up the session store or causing other users' session records to be evicted.
Affected Software | Affected Version | How to fix |
---|---|---|
Django |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID REDHAT-BUG-1252890 pertains to Django allowing session creation through an unauthenticated access to the logout view, potentially enabling unauthorized actions.
The severity of vulnerability REDHAT-BUG-1252890 is rated as medium, due to its potential impact on session management.
To fix vulnerability REDHAT-BUG-1252890, ensure that the logout view is properly protected with the 'login_required' decorator.
The exact versions of Django affected by REDHAT-BUG-1252890 are not specified, but any version utilizing the vulnerable logout view without necessary protections is at risk.
There is no specific information available indicating that vulnerability REDHAT-BUG-1252890 is under active exploitation at this time.