Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2015-0220
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://secunia.com/advisories/62285
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://secunia.com/advisories/62309
- http://ubuntu.com/usn/usn-2469-1
- http://secunia.com/advisories/62718
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html