Skip to content

django-anymail Includes Sensitive Information in Log Files

High severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Jan 27, 2023

Package

pip django-anymail (pip)

Affected versions

>= 0.2, < 1.4

Patched versions

1.4

Description

Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, an attacker could discover your ANYMAIL_WEBHOOK setting and use this to post fabricated or malicious Anymail tracking/inbound events to your app. This vulnerability appears to have been fixed in v1.4.

References

Published by the National Vulnerability Database Mar 13, 2018
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jul 27, 2022
Last updated Jan 27, 2023

Severity

High
7.4
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Weaknesses

CVE ID

CVE-2018-1000089

GHSA ID

GHSA-qh9x-mc42-vg4g

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.