CVE-2011-0696

Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
CSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
djangoprojectdjango
1.1
djangoprojectdjango
1.1.0
djangoprojectdjango
1.1.2
djangoprojectdjango
1.1.3
djangoprojectdjango
1.2
djangoprojectdjango
1.2.1
djangoprojectdjango
1.2.2
djangoprojectdjango
1.2.3
djangoprojectdjango
1.2.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-django
bullseye (security)
2:2.2.28-1~deb11u2
fixed
bullseye
2:2.2.28-1~deb11u2
fixed
lenny
not-affected
bookworm
3:3.2.19-1+deb12u1
fixed
bookworm (security)
3:3.2.19-1+deb12u1
fixed
sid
3:4.2.16-1
fixed
trixie
3:4.2.16-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-django
oneiric
Fixed 1.2.5-1ubuntu1
released
natty
Fixed 1.2.5-1ubuntu1
released
maverick
Fixed 1.2.3-1ubuntu0.2.10.10.2
released
lucid
Fixed 1.1.1-2ubuntu1.3
released
karmic
Fixed 1.1.1-1ubuntu1.2
released
hardy
ignored
dapper
dne
References