PYSEC-2020-230

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/django-user-sessions/PYSEC-2020-230.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2020-230
Aliases
Published
2020-01-24T20:15:00Z
Modified
2023-11-08T04:03:51.799573Z
Summary
[none]
Details

In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.

References

Affected packages

PyPI / django-user-sessions

Package

Name
django-user-sessions
View open source insights on deps.dev
Purl
pkg:pypi/django-user-sessions

Affected ranges

Type
GIT
Repo
https://github.com/jazzband/django-user-sessions
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.1

Affected versions

0.*

0.1.0-dev
0.1.0-beta
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4

1.*

1.0.0-beta1
1.0.0
1.1.0
1.1.1
1.2.0
1.3.0
1.3.1
1.4.0
1.5.0
1.5.1
1.5.2
1.5.3
1.6.0
1.7.0