CVE-2015-3982

Severity

50%

Complexity

99%

Confidentiality

48%

CWE-384: Session Fixation

The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.

CWE-384: Session Fixation

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).

Overview

Type

Django Project Django

First reported 9 years ago

2015-06-02 14:59:00

Last updated 8 years ago

2016-12-06 03:01:00

Affected Software

Django Project Django 1.8.0

1.8.0

Django Project Django 1.8.1

1.8.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.