
=====================================================================

                                      CERT-Renater

                           Note d'Information No. 2021/VULN639
_____________________________________________________________________

DATE                : 07/12/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Airavata Django Portal
                       versions master branch before commit 3c5d8c7.

=====================================================================
http://mail-archives.apache.org/mod_mbox/airavata-dev/202112.mbox/%3c09c06a78-7bd9-35c8-811e-2d5dd2df6345@apache.org%3e
_____________________________________________________________________


CVE-2021-43410: Apache Airavata Django Portal: airavata-django-portal
allows CRLF log injection because of the lack of escaping in the log
statements
Date 	Mon, 06 Dec 2021 19:13:10 GMT


Severity: low

Description:

Apache Airavata Django Portal allows CRLF log injection because of lack
of escaping log statements.
In particular, some HTTP request parameters are logged without first
being escaped.


Versions affected:

master branch before commit 3c5d8c7 [1] of airavata-django-portal

[1] 
https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170


Credit:

Apache Airavata would like to thank haby0 of Duxiaoman Financial
Security Team for reporting this vulnerability.




=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================

