Safety vulnerability ID: 25732
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application