GHSA-6rmf-cv6p-4h27

Suggest an improvement
Source
https://github.com/advisories/GHSA-6rmf-cv6p-4h27
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-6rmf-cv6p-4h27/GHSA-6rmf-cv6p-4h27.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-6rmf-cv6p-4h27
Aliases
Published
2022-12-17T15:30:23Z
Modified
2023-11-01T05:00:24.635454Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Terms and Conditions Module vulnerable to Open Redirect
Details

A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.10 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 2.0.11 can address this issue. The name of the patch is 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216175.

Database specific
{
    "nvd_published_at": "2022-12-17T13:15:00Z",
    "github_reviewed_at": "2022-12-19T18:14:46Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

PyPI / django-termsandconditions

Package

Name
django-termsandconditions
View open source insights on deps.dev
Purl
pkg:pypi/django-termsandconditions

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.11

Affected versions

0.*

0.1.4
0.1.5
0.1.6
0.1.7

1.*

1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.1.8
1.1.9
1.1.10
1.1.11
1.1.12
1.1.13
1.1.14
1.1.15
1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.2.10
1.2.11
1.2.12
1.2.13
1.2.15

2.*

2.0
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.0.9
2.0.10

Ecosystem specific

{
    "affected_functions": [
        "termsandconditions.views.GetTermsViewMixin.get_return_to",
        "termsandconditions.views.GetTermsViewMixin.is_safe_url",
        "termsandconditions.views.AcceptTermsView.get_initial",
        "termsandconditions.views.AcceptTermsView.post",
        "termsandconditions.views.EmailTermsView.get_initial",
        "termsandconditions.views.EmailTermsView.form_valid"
    ]
}