Search criteria
2 vulnerabilities found for Apache Airavata Django Portal by Apache Software Foundation
CVE-2021-43410 (GCVE-0-2021-43410)
Vulnerability from nvd – Published: 2021-12-09 09:00 – Updated: 2024-08-04 03:55
VLAI?
Title
airavata-django-portal allows CRLF log injection because of the lack of escaping in the log statements
Summary
Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170
Severity ?
No CVSS data available.
CWE
- CWE-117 - Improper Output Neutralization for Logs
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Airavata Django Portal |
Affected:
master branch , < commit 3c5d8c7
(custom)
|
Credits
Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:55:29.278Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache Airavata Django Portal",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "commit 3c5d8c7",
"status": "affected",
"version": "master branch",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability."
}
],
"descriptions": [
{
"lang": "en",
"value": "Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170"
}
],
"metrics": [
{
"other": {
"content": {
"other": "low"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-117",
"description": "CWE-117: Improper Output Neutralization for Logs",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-09T09:00:12",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "airavata-django-portal allows CRLF log injection because of the lack of escaping in the log statements",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2021-43410",
"STATE": "PUBLIC",
"TITLE": "airavata-django-portal allows CRLF log injection because of the lack of escaping in the log statements"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Airavata Django Portal",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "master branch",
"version_value": "commit 3c5d8c7"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{
"other": "low"
}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-117: Improper Output Neutralization for Logs"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31",
"refsource": "MISC",
"url": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2021-43410",
"datePublished": "2021-12-09T09:00:12",
"dateReserved": "2021-11-06T00:00:00",
"dateUpdated": "2024-08-04T03:55:29.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-43410 (GCVE-0-2021-43410)
Vulnerability from cvelistv5 – Published: 2021-12-09 09:00 – Updated: 2024-08-04 03:55
VLAI?
Title
airavata-django-portal allows CRLF log injection because of the lack of escaping in the log statements
Summary
Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170
Severity ?
No CVSS data available.
CWE
- CWE-117 - Improper Output Neutralization for Logs
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Airavata Django Portal |
Affected:
master branch , < commit 3c5d8c7
(custom)
|
Credits
Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:55:29.278Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache Airavata Django Portal",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "commit 3c5d8c7",
"status": "affected",
"version": "master branch",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability."
}
],
"descriptions": [
{
"lang": "en",
"value": "Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170"
}
],
"metrics": [
{
"other": {
"content": {
"other": "low"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-117",
"description": "CWE-117: Improper Output Neutralization for Logs",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-09T09:00:12",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "airavata-django-portal allows CRLF log injection because of the lack of escaping in the log statements",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2021-43410",
"STATE": "PUBLIC",
"TITLE": "airavata-django-portal allows CRLF log injection because of the lack of escaping in the log statements"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Airavata Django Portal",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "master branch",
"version_value": "commit 3c5d8c7"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Apache Airavata would like to thank haby0 of Duxiaoman Financial Security Team for reporting this vulnerability."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{
"other": "low"
}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-117: Improper Output Neutralization for Logs"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31",
"refsource": "MISC",
"url": "https://lists.apache.org/thread/q64h16ofdxk29soz3jj561nysnzcrl31"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2021-43410",
"datePublished": "2021-12-09T09:00:12",
"dateReserved": "2021-11-06T00:00:00",
"dateUpdated": "2024-08-04T03:55:29.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}