CVE-2016-7401 — Cross-Site Request Forgery in Django
Severity
7.5HIGHNVD
EPSS
4.4%
top 11.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 3
Latest updateMay 14
Description
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 16.04
Patches
🔴Vulnerability Details
5📋Vendor Advisories
3💬Community
5Bugzilla▶
CVE-2016-7401 python-django15: python-django: CSRF protection bypass on a site with Google Analytics [epel-6]↗2016-09-26
Bugzilla▶
CVE-2016-7401 python-django: CSRF protection bypass on a site with Google Analytics [epel-7]↗2016-09-26
Bugzilla▶
CVE-2016-7401 Django14: python-django: CSRF protection bypass on a site with Google Analytics [epel-6]↗2016-09-26
Bugzilla▶
CVE-2016-7401 python-django: CSRF protection bypass on a site with Google Analytics [fedora-all]↗2016-09-26
Bugzilla
▶