This security bulletin contains one medium risk vulnerability.
Exploit availability: NoDescription
The vulnerability allows a remote attacker to perform web cache spoofing attack.
The vulnerability exists due to insufficient validation of user-supplied input in django.utils.http.limited_parse_qsl() when parsing strings with a semicolon (";"). A remote attacker can pass specially crafted data to the application and perform a spoofing attack.Mitigation
Install updates from vendor's website.Vulnerable software versions
Django: 3.0 - 3.1.6, 2.2 - 2.2.18
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?