Vulnerability CVE-2017-7233


Published: 2017-04-04

Description:
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

Type:

CWE-601

(URL Redirection to Untrusted Site ('Open Redirect'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Djangoproject -> Django 

 References:
http://www.debian.org/security/2017/dsa-3835
http://www.securityfocus.com/bid/97406
http://www.securitytracker.com/id/1038177
https://access.redhat.com/errata/RHSA-2017:1445
https://access.redhat.com/errata/RHSA-2017:1451
https://access.redhat.com/errata/RHSA-2017:1462
https://access.redhat.com/errata/RHSA-2017:1470
https://access.redhat.com/errata/RHSA-2017:1596
https://access.redhat.com/errata/RHSA-2017:3093
https://access.redhat.com/errata/RHSA-2018:2927
https://www.djangoproject.com/weblog/2017/apr/04/security-releases/

Copyright 2024, cxsecurity.com

 

Back to Top