CVE Vulnerabilities

CVE-2020-13254

Improper Certificate Validation

Published: Jun 03, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
DjangoDjangoproject2.2 (including)2.2.13 (excluding)
DjangoDjangoproject3.0 (including)3.0.7 (excluding)
Red Hat OpenStack Platform 13.0 (Queens)RedHatpython-django-0:1.11.27-3.el7ost*
Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUSRedHatpython-django-0:1.11.27-3.el7ost*
Red Hat OpenStack Platform 16.1RedHatpython-django20-0:2.0.13-12.el8ost*
Python-djangoUbuntubionic*
Python-djangoUbuntudevel*
Python-djangoUbuntueoan*
Python-djangoUbuntuesm-infra-legacy/trusty*
Python-djangoUbuntuesm-infra/bionic*
Python-djangoUbuntuesm-infra/focal*
Python-djangoUbuntuesm-infra/xenial*
Python-djangoUbuntufocal*
Python-djangoUbuntutrusty*
Python-djangoUbuntutrusty/esm*
Python-djangoUbuntuupstream*
Python-djangoUbuntuxenial*

Potential Mitigations

References