Описание
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1.6.6-1ubuntu3 |
esm-infra-legacy/trusty | not-affected | 1.6.1-2ubuntu0.6 |
lucid | released | 1.1.1-2ubuntu1.14 |
precise | released | 1.3.1-4ubuntu1.13 |
trusty | released | 1.6.1-2ubuntu0.6 |
trusty/esm | not-affected | 1.6.1-2ubuntu0.6 |
upstream | released | 1.6.10 |
utopic | released | 1.6.6-1ubuntu2.1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6 ...
EPSS
4.3 Medium
CVSS2