Vulnerability CVE-2015-2317


Published: 2015-03-25

Description:
The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Oracle -> Solaris 
Opensuse -> Opensuse 
Novell -> Opensuse 
Fedoraproject -> Fedora 
Djangoproject -> Django 
Debian -> Debian linux 
Canonical -> Ubuntu linux 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
http://ubuntu.com/usn/usn-2539-1
http://www.debian.org/security/2015/dsa-3204
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.securityfocus.com/bid/73319
https://www.djangoproject.com/weblog/2015/mar/18/security-releases/

Copyright 2024, cxsecurity.com

 

Back to Top