CVE-2020-5224

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-5224
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-5224.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-5224
Aliases
Published
2020-01-24T20:15:10Z
Modified
2024-09-03T03:31:09.371143Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.

References

Affected packages

Git / github.com/jazzband/django-user-sessions

Affected ranges

Type
GIT
Repo
https://github.com/jazzband/django-user-sessions
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.1.3
0.1.4

1.*

1.0.0
1.0.0-beta1
1.1.0
1.1.1
1.2.0
1.3.0
1.3.1
1.4.0
1.5.0
1.5.1
1.5.2
1.5.3
1.6.0
1.7.0