CVE-2016-7401

Published on: 10/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:07 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:

The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.

  • CVE-2016-7401 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
Django security releases issued: 1.9.10 and 1.8.15 | Weblog | Django Patch
Vendor Advisory
www.djangoproject.com
text/html
URL Logo CONFIRM www.djangoproject.com/weblog/2016/sep/26/security-releases/
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2040
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2038
Debian -- Security Information -- DSA-3678-1 python-django Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3678
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2042
USN-3089-1: Django vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-3089-1
Django CVE-2016-7401 Cross Site Request Forgery Vulnerability Third Party Advisory
cve.report (archive)
text/html
URL Logo BID 93182
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2041
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2039
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2043
Django Google Analytics Cookie Parsing Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks - SecurityTracker Third Party Advisory
www.securitytracker.com
text/html
URL Logo SECTRACK 1036899

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationDjangoprojectDjango1.9.0AllAllAll
ApplicationDjangoprojectDjango1.9.1AllAllAll
ApplicationDjangoprojectDjango1.9.2AllAllAll
ApplicationDjangoprojectDjango1.9.3AllAllAll
ApplicationDjangoprojectDjango1.9.4AllAllAll
ApplicationDjangoprojectDjango1.9.5AllAllAll
ApplicationDjangoprojectDjango1.9.6AllAllAll
ApplicationDjangoprojectDjango1.9.7AllAllAll
ApplicationDjangoprojectDjango1.9.8AllAllAll
ApplicationDjangoprojectDjango1.9.9AllAllAll
ApplicationDjangoprojectDjango1.9.0AllAllAll
ApplicationDjangoprojectDjango1.9.1AllAllAll
ApplicationDjangoprojectDjango1.9.2AllAllAll
ApplicationDjangoprojectDjango1.9.3AllAllAll
ApplicationDjangoprojectDjango1.9.4AllAllAll
ApplicationDjangoprojectDjango1.9.5AllAllAll
ApplicationDjangoprojectDjango1.9.6AllAllAll
ApplicationDjangoprojectDjango1.9.7AllAllAll
ApplicationDjangoprojectDjango1.9.8AllAllAll
ApplicationDjangoprojectDjango1.9.9AllAllAll
ApplicationDjangoprojectDjangoAllAllAllAll
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*: