Safety vulnerability ID: 71909
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude new lines.
Latest version: 2.11.2
CKAN Software
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application