webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events.
References
Link | Resource |
---|---|
https://github.com/anymail/django-anymail/releases/tag/v1.3 | Release Notes |
https://github.com/anymail/django-anymail/releases/tag/v1.2.1 | Release Notes |
https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5 | Patch |
https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b | Patch |
https://bugs.debian.org/889450 | Issue Tracking Patch Third Party Advisory |
https://www.debian.org/security/2018/dsa-4107 | Third Party Advisory |
Information
Published : 2018-02-03 13:29
Updated : 2018-03-02 05:56
NVD link : CVE-2018-6596
Mitre link : CVE-2018-6596
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
django-anymail_project
- django-anymail