The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
References
Link | Resource |
---|---|
http://ubuntu.com/usn/usn-2539-1 | Third Party Advisory |
https://www.djangoproject.com/weblog/2015/mar/18/security-releases/ | Vendor Advisory |
http://www.debian.org/security/2015/dsa-3204 | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:195 | Broken Link |
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html | |
http://www.securityfocus.com/bid/73319 | |
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2015-03-25 07:59
Updated : 2018-10-30 09:27
NVD link : CVE-2015-2317
Mitre link : CVE-2015-2317
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
fedoraproject
- fedora
djangoproject
- django
canonical
- ubuntu_linux
debian
- debian_linux
opensuse
- opensuse
oracle
- solaris