mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
136 lines
5.5 KiB
JSON
136 lines
5.5 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2021-21416",
|
||
|
"sourceIdentifier": "security-advisories@github.com",
|
||
|
"published": "2021-04-01T22:15:11.653",
|
||
|
"lastModified": "2021-04-06T18:40:50.293",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "django-registration is a user registration package for Django. The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django. Triggering this requires: A site is using django-registration < 3.1.2, The site has detailed error reports (such as Django's emailed error reports to site staff/developers) enabled and a server-side error (HTTP 5xx) occurs during an attempt by a user to register an account. Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password)."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "django-registration es un paquete de registro de usuarios para Django. El paquete django-registration proporciona herramientas para implementar flujos de registro de cuentas de usuario en el framework web de Django. En django-registration anterior a versi\u00f3n 3.1.2, la vista de registro de la cuenta de usuario base no aplicaba filtros correctamente a los datos confidenciales, con el resultado de que los datos confidenciales podr\u00edan incluirse en los reportes de errores en lugar de ser eliminados autom\u00e1ticamente por Django. Activar esto requiere: Un sitio est\u00e1 usando django-registration versiones anteriores a 3.1.2, El sitio tiene reportes de error detallados (como los reportes de error enviados por correo electr\u00f3nico de Django al personal y desarrolladores del sitio) habilitados y se produce un error del lado del servidor (HTTP 5xx) durante un intento de por parte de un usuario de un registro de cuenta. Bajo estas condiciones, los destinatarios del reporte de error detallado ver\u00e1n todos los datos enviados desde el intento de registro de la cuenta, que pueden incluir las credenciales propuestas del usuario (tales como una contrase\u00f1a)"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "HIGH",
|
||
|
"userInteraction": "REQUIRED",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 2.6,
|
||
|
"baseSeverity": "LOW"
|
||
|
},
|
||
|
"exploitabilityScore": 1.0,
|
||
|
"impactScore": 1.4
|
||
|
},
|
||
|
{
|
||
|
"source": "security-advisories@github.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
|
"attackVector": "LOCAL",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "HIGH",
|
||
|
"userInteraction": "REQUIRED",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "LOW",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 3.7,
|
||
|
"baseSeverity": "LOW"
|
||
|
},
|
||
|
"exploitabilityScore": 0.6,
|
||
|
"impactScore": 2.7
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "SINGLE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 3.5
|
||
|
},
|
||
|
"baseSeverity": "LOW",
|
||
|
"exploitabilityScore": 6.8,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-209"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"source": "security-advisories@github.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-209"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:django-registration_project:django-registration:*:*:*:*:*:django:*:*",
|
||
|
"versionEndExcluding": "3.1.2",
|
||
|
"matchCriteriaId": "8F73EB1B-920E-43CB-9A00-179AA53784FB"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh",
|
||
|
"source": "security-advisories@github.com",
|
||
|
"tags": [
|
||
|
"Mitigation",
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|