Skip to content

django-anymail Includes Sensitive Information in Log Files

High severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Sep 16, 2024

Package

pip django-anymail (pip)

Affected versions

>= 0.2, < 1.4

Patched versions

1.4

Description

Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, an attacker could discover your ANYMAIL_WEBHOOK setting and use this to post fabricated or malicious Anymail tracking/inbound events to your app. This vulnerability appears to have been fixed in v1.4.

References

Published by the National Vulnerability Database Mar 13, 2018
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jul 27, 2022
Last updated Sep 16, 2024

Severity

High

EPSS score

0.178%
(56th percentile)

Weaknesses

CVE ID

CVE-2018-1000089

GHSA ID

GHSA-qh9x-mc42-vg4g

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.