Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2015-0220

Overview

Vulnerability Score 4.3 4.3
CVE Id CVE-2015-0220
Last Modified 17 Apr 2015 09:59:52
Published 16 Jan 2015 11:59:19
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2015-0220

Summary

The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.

Vulnerable Systems

Operating System

  • Canonical Ubuntu Linux 10.04

  • Canonical Ubuntu Linux 12.04

  • Canonical Ubuntu Linux 14.04

  • Canonical Ubuntu Linux 14.10

Application

  • Djangoproject Django 1.4.17

  • Djangoproject Django 1.6

  • Djangoproject Django 1.6.1

  • Djangoproject Django 1.6.2

  • Djangoproject Django 1.6.3

  • Djangoproject Django 1.6.4

  • Djangoproject Django 1.6.5

  • Djangoproject Django 1.6.6

  • Djangoproject Django 1.6.7

  • Djangoproject Django 1.6.8

  • Djangoproject Django 1.6.9

  • Djangoproject Django 1.7

  • Djangoproject Django 1.7.1

  • Djangoproject Django 1.7.2


References

CONFIRM - https://www.djangoproject.com/weblog/2015/jan/13/security/

UBUNTU - USN-2469-1

SECUNIA - 62309

SECUNIA - 62285

SECUNIA - 62718

MANDRIVA - MDVSA-2015:036

CONFIRM - http://advisories.mageia.org/MGASA-2015-0026.html

MANDRIVA - MDVSA-2015:109

SUSE - openSUSE-SU-2015:0643

FEDORA - FEDORA-2015-0804

FEDORA - FEDORA-2015-0714


Last Updated: 27 May 2016 11:08:17