Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <39c0a5b8-8523-d46c-9488-77d9c422bb8b@apache.org>
Date: Mon, 06 Dec 2021 19:13:10 +0000
From: Marcus Christie <machristie@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2021-43410: Apache Airavata Django Portal:
 airavata-django-portal allows CRLF log injection because of the lack of
 escaping in the log statements 

Severity: low

Description:

Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped.

Versions affected:
master branch before commit 3c5d8c7 [1] of airavata-django-portal

[1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170

Credit:

Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.