// For flags

CVE-2020-35681

 

Severity Score

7.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing, responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data. Note that this affects only the legacy Channels provided class, and not Django's similar ASGIHandler, available from Django 3.0.

Django Channels versiones 3.x anteriores a 3.0.3, permite a atacantes remotos obtener información confidencial de un alcance de petición diferente. La clase channels.http.AsgiHandler legacy, usada para manejar peticiones de tipo HTTP en un entorno ASGI anterior a Django versión 3.0, no separaba correctamente los ámbitos de petición en Channels versión 3.0. En muchos casos, esto resulta en un bloqueo, pero, con el tiempo correcto, las respuestas podrían ser enviadas al cliente equivocado, resultando en una posible filtración de identificadores de sesión y otros datos confidenciales. Note que esto afecta solo a la clase legacy proporcionada de Channels, y no al ASGIHandler similar de Django, disponible en Django versión 3.0

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-24 CVE Reserved
  • 2021-02-22 CVE Published
  • 2023-11-07 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Djangoproject
Search vendor "Djangoproject"
Channels
Search vendor "Djangoproject" for product "Channels"
>= 3.0.0 < 3.0.3
Search vendor "Djangoproject" for product "Channels" and version " >= 3.0.0 < 3.0.3"
-
Affected