CVE-2020-25626

A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
References
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:encode:django_rest_framework:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Information

Published : 2020-09-30 13:15

Updated : 2022-09-28 12:35


NVD link : CVE-2020-25626

Mitre link : CVE-2020-25626


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

encode

  • django_rest_framework

redhat

  • ceph_storage