PyPi: Django

CVE-2014-3730

Safety vulnerability ID: 35569

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 16, 2014 Updated at Dec 17, 2024
Scan your Python projects for vulnerabilities →

Advisory

The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."

Affected package

django

Latest version: 5.1.4

A high-level Python web framework that encourages rapid development and clean, pragmatic design.

Affected versions

Fixed versions

Vulnerability changelog

The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."


MLIST:[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated: http://www.openwall.com/lists/oss-security/2014/05/14/10
MLIST:[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated: http://www.openwall.com/lists/oss-security/2014/05/15/3
CONFIRM:https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/: https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/
DEBIAN:DSA-2934: http://www.debian.org/security/2014/dsa-2934
SUSE:openSUSE-SU-2014:1132: http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
UBUNTU:USN-2212-1: http://ubuntu.com/usn/usn-2212-1
BID:67410: http://www.securityfocus.com/bid/67410
SECUNIA:61281: http://secunia.com/advisories/61281

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.3

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE