The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
References
Link | Resource |
---|---|
http://ubuntu.com/usn/usn-2212-1 | Third Party Advisory |
https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/ | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2014/05/15/3 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/05/14/10 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-2934 | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | Third Party Advisory |
http://www.securityfocus.com/bid/67410 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/61281 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Information
Published : 2014-05-16 08:55
Updated : 2018-10-30 09:27
NVD link : CVE-2014-3730
Mitre link : CVE-2014-3730
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
opensuse
- opensuse
djangoproject
- django