Safety vulnerability ID: 52467
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.9 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely.
Latest version: 2.0.12
Django app that enables users to accept terms and conditions of a site.
A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.10 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 2.0.11 is able to address this issue. The name of the patch is 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216175. See CVE-2022-4589.
MISC:https://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a: https://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a
MISC:https://github.com/cyface/django-termsandconditions/pull/239: https://github.com/cyface/django-termsandconditions/pull/239
MISC:https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.11: https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.11
MISC:https://vuldb.com/?id.216175: https://vuldb.com/?id.216175
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application