Safety vulnerability ID: 35569
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
Latest version: 5.1.4
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
MLIST:[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated: http://www.openwall.com/lists/oss-security/2014/05/14/10
MLIST:[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated: http://www.openwall.com/lists/oss-security/2014/05/15/3
CONFIRM:https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/: https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/
DEBIAN:DSA-2934: http://www.debian.org/security/2014/dsa-2934
SUSE:openSUSE-SU-2014:1132: http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
UBUNTU:USN-2212-1: http://ubuntu.com/usn/usn-2212-1
BID:67410: http://www.securityfocus.com/bid/67410
SECUNIA:61281: http://secunia.com/advisories/61281
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application