Djangorestframework vulnerable to Cross-site Scripting (XSS) via break_long_headers template filter
CVE-2024-21520

5.3MEDIUM

Key Information:

Vendor

Django

Vendor
CVE Published:
26 June 2024

What is CVE-2024-21520?

A security vulnerability exists in the Django REST Framework where improper input sanitization can lead to cross-site scripting (XSS) attacks through the break_long_headers template filter. This flaw allows attackers to inject malicious scripts, potentially compromising user data and sessions. The vulnerability is present in all versions prior to 3.15.2, making it essential for users to upgrade to the latest version to mitigate the risk. By failing to adequately sanitize inputs prior to processing, affected systems may exhibit unexpected behavior, enabling exploitation by malicious entities.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

djangorestframework 0 < 3.15.2

References

EPSS Score

16% chance of being exploited in the next 30 days.

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

ch4n3-yoon
.