Safety vulnerability ID: 35510
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Django 1.4.11, 1.5.6, 1.6.3 and 1.7b2 include a fix for CVE-2014-0472: The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path.
https://www.djangoproject.com/weblog/2014/apr/21/security
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."
CONFIRM:https://www.djangoproject.com/weblog/2014/apr/21/security/: https://www.djangoproject.com/weblog/2014/apr/21/security/
DEBIAN:DSA-2934: http://www.debian.org/security/2014/dsa-2934
REDHAT:RHSA-2014:0456: http://rhn.redhat.com/errata/RHSA-2014-0456.html
REDHAT:RHSA-2014:0457: http://rhn.redhat.com/errata/RHSA-2014-0457.html
SUSE:openSUSE-SU-2014:1132: http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
UBUNTU:USN-2169-1: http://www.ubuntu.com/usn/USN-2169-1
SECUNIA:61281: http://secunia.com/advisories/61281
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application