|
Message-ID: <39c0a5b8-8523-d46c-9488-77d9c422bb8b@apache.org> Date: Mon, 06 Dec 2021 19:13:10 +0000 From: Marcus Christie <machristie@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2021-43410: Apache Airavata Django Portal: airavata-django-portal allows CRLF log injection because of the lack of escaping in the log statements Severity: low Description: Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170 Credit: Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.