CVE-2020-25626

A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:encode:django_rest_framework:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

22 Jul 2022, 20:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5186 -

01 Jan 2022, 18:40

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20201016-0003/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20201016-0003/ - Third Party Advisory

Information

Published : 2020-09-30 20:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-25626

Mitre link : CVE-2020-25626

CVE.ORG link : CVE-2020-25626


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • ceph_storage

encode

  • django_rest_framework
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-20

Improper Input Validation