The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html | |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html | |
http://ubuntu.com/usn/usn-2539-1 | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3204 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:195 | Broken Link |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | Third Party Advisory |
http://www.securityfocus.com/bid/73319 | |
https://www.djangoproject.com/weblog/2015/mar/18/security-releases/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2015-03-25 14:59
Updated : 2024-02-04 18:35
NVD link : CVE-2015-2317
Mitre link : CVE-2015-2317
CVE.ORG link : CVE-2015-2317
JSON object : View
Products Affected
debian
- debian_linux
opensuse
- opensuse
canonical
- ubuntu_linux
djangoproject
- django
fedoraproject
- fedora
oracle
- solaris
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')