Description
In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0066 | In Django User Sessions (django-user-sessions) before 1.7.1, the views provided allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen. |
Github GHSA |
GHSA-5fq8-3q2f-4m5g | Session key exposure through session list in Django User Sessions |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T08:22:08.941Z
Reserved: 2020-01-02T00:00:00.000Z
Link: CVE-2020-5224
No data.
Status : Modified
Published: 2020-01-24T20:15:10.720
Modified: 2024-11-21T05:33:42.787
Link: CVE-2020-5224
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA