Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7233

Опубликовано: 04 апр. 2017
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely django.utils.http.is_safe_url()) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on is_safe_url() to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard.

Отчет

This issue affects the versions of python-django as shipped with Red Hat Satellite 6. Please note that python-django, as used by Pulp does not make use of the Pulp doesn't use "is_safe_url" directly or the "i18n" views or the "django.contrib.auth" Login view. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 1.3calamari-serverWill not fix
Red Hat Ceph Storage 2python-djangoWill not fix
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)python-djangoWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) Operational Toolspython-djangoWill not fix
Red Hat OpenStack Platform 10 (Newton) Operational Toolspython-djangoNot affected
Red Hat OpenStack Platform 12 (Pike)python-djangoNot affected
Red Hat OpenStack Platform 8 (Liberty) Operational Toolspython-djangoWill not fix
Red Hat OpenStack Platform 9 (Mitaka) Operational Toolspython-djangoWill not fix
Red Hat Storage Console 2DjangoWill not fix
Red Hat Storage Console 2python-djangoWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1437234python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs

EPSS

Процентиль: 80%
0.01454
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 8 лет назад

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

CVSS3: 6.1
nvd
около 8 лет назад

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

CVSS3: 6.1
debian
около 8 лет назад

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 re ...

CVSS3: 6.1
github
больше 6 лет назад

Django open redirect and possible XSS attack via user-supplied numeric redirect URLs

suse-cvrf
около 7 лет назад

Security update for python-Django

EPSS

Процентиль: 80%
0.01454
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2017-7233