Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-3442

Опубликовано: 31 июл. 2012
Источник: debian
EPSS Низкий

Описание

The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed1.4.1-1package

Примечания

  • https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/

  • https://www.openwall.com/lists/oss-security/2012/07/31/1

  • https://www.openwall.com/lists/oss-security/2012/07/31/2

EPSS

Процентиль: 62%
0.00442
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.

nvd
почти 13 лет назад

The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.

CVSS3: 6.1
github
около 3 лет назад

Django Allows Redirect via Data URL

EPSS

Процентиль: 62%
0.00442
Низкий