Vulnerability CVE-2014-3730


Published: 2014-05-16

Description:
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."

See advisories in our WLB2 database:
Topic
Author
Date
Low
Django Malformed URLs from user input incorrectly validated
Salvatore
15.05.2014

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Opensuse -> Opensuse 
Novell -> Opensuse 
Djangoproject -> Django 
Debian -> Debian linux 
Canonical -> Ubuntu linux 

 References:
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
http://secunia.com/advisories/61281
http://ubuntu.com/usn/usn-2212-1
http://www.debian.org/security/2014/dsa-2934
http://www.openwall.com/lists/oss-security/2014/05/14/10
http://www.openwall.com/lists/oss-security/2014/05/15/3
http://www.securityfocus.com/bid/67410
https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/

Copyright 2024, cxsecurity.com

 

Back to Top