Django allows user sessions hijacking via an empty string in the session key
Moderate severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Sep 17, 2024
Description
Published by the National Vulnerability Database
Jun 2, 2015
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Apr 29, 2024
Last updated
Sep 17, 2024
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
References