Safety vulnerability ID: 33063
The information on this page was manually curated by our Cybersecurity Intelligence Team.
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application