First published: Thu Jun 27 2024(Updated: )
Versions of the package djangorestframework before 3.15.2 are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags. <a href="https://github.com/encode/django-rest-framework/commit/3b41f0124194430da957b119712978fa2266b642">https://github.com/encode/django-rest-framework/commit/3b41f0124194430da957b119712978fa2266b642</a> <a href="https://github.com/encode/django-rest-framework/pull/9435">https://github.com/encode/django-rest-framework/pull/9435</a> <a href="https://security.snyk.io/vuln/SNYK-PYTHON-DJANGORESTFRAMEWORK-7252137">https://security.snyk.io/vuln/SNYK-PYTHON-DJANGORESTFRAMEWORK-7252137</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Django REST Framework | <3.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2294457 is classified as a high severity vulnerability due to its potential for Cross-site Scripting (XSS) attacks.
To fix REDHAT-BUG-2294457, upgrade the Django REST Framework to version 3.15.2 or later.
Versions of the Django REST Framework prior to 3.15.2 are affected by REDHAT-BUG-2294457.
REDHAT-BUG-2294457 is a Cross-site Scripting (XSS) vulnerability caused by improper input sanitization.
Yes, user data may be at risk due to potential XSS attacks that can exploit REDHAT-BUG-2294457.