Cleartext transmission of sensitive information in Django - CVE-2019-12781

 

Cleartext transmission of sensitive information in Django - CVE-2019-12781

Published: July 2, 2019


Vulnerability identifier: #VU18967
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-12781
CWE-ID: CWE-319
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Django Software Foundation
Affected software:
Django

Detailed vulnerability description

The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to django.http.HttpRequest.scheme, when deployed behind a reverse-proxy, does not correctly treat requests sent over HTTP protocol, assuming that a secure protocol is used for communication. A remote attacker with ability to force victim to use HTTP instead of HTTPS protocol can perform man-in-the-middle (MitM) attack and intercept communication in cleat text.


How to mitigate CVE-2019-12781

Install updates from vendor's website.

Sources