PyPi: Django-Termsandconditions

CVE-2022-4589

Safety vulnerability ID: 52467

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Dec 17, 2022 Updated at May 17, 2024
Scan your Python projects for vulnerabilities →

Advisory

A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.9 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely.

Affected package

django-termsandconditions

Latest version: 2.0.12

Django app that enables users to accept terms and conditions of a site.

Affected versions

Fixed versions

Vulnerability changelog

A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.10 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 2.0.11 is able to address this issue. The name of the patch is 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216175. See CVE-2022-4589.


MISC:https://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a: https://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a
MISC:https://github.com/cyface/django-termsandconditions/pull/239: https://github.com/cyface/django-termsandconditions/pull/239
MISC:https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.11: https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.11
MISC:https://vuldb.com/?id.216175: https://vuldb.com/?id.216175

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.1

CVSS v3 Details

MEDIUM 6.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE