Safety vulnerability ID: 35513
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
CONFIRM:https://www.djangoproject.com/weblog/2014/aug/20/security/: https://www.djangoproject.com/weblog/2014/aug/20/security/
DEBIAN:DSA-3010: http://www.debian.org/security/2014/dsa-3010
SUSE:openSUSE-SU-2014:1132: http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
BID:69425: http://www.securityfocus.com/bid/69425
SECUNIA:59782: http://secunia.com/advisories/59782
SECUNIA:61276: http://secunia.com/advisories/61276
SECUNIA:61281: http://secunia.com/advisories/61281
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application