Watemlifts / wagtail

A Django content management system focused on flexibility and user experience
https://wagtail.io
BSD 3-Clause "New" or "Revised" License
1 stars 0 forks source link

CVE-2022-22818 (Medium) detected in Django-2.2.4.tar.gz #188

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2022-22818 - Medium Severity Vulnerability

Vulnerable Library - Django-2.2.4.tar.gz

A high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Library home page: https://files.pythonhosted.org/packages/19/11/3449a2071df9427e7a5c4dddee2462e88840dd968a9b0c161097154fcb0c/Django-2.2.4.tar.gz

Path to dependency file: /wagtail/wagtail/project_template/requirements.txt

Path to vulnerable library: /teSource-ArchiveExtractor_6a8a4d3e-1a25-411e-895f-d18400c71569/20190823195740_81768/20190823195722_depth_0/1/Django-2.2.4.tar/Django-2.2.4

Dependency Hierarchy: - :x: **Django-2.2.4.tar.gz** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.

Publish Date: 2022-02-03

URL: CVE-2022-22818

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.djangoproject.com/weblog/2022/feb/01/security-releases/

Release Date: 2022-02-03

Fix Resolution: 2.2.27


Step up your Open Source Security Game with Mend here