All the vulnerabilites related to djangoproject - django
cve-2021-44420
Vulnerability from cvelistv5
Published
2021-12-07 22:55
Modified
2024-08-04 04:17
Severity ?
EPSS score ?
Summary
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.2/releases/security/ | x_refsource_MISC | |
https://www.openwall.com/lists/oss-security/2021/12/07/1 | x_refsource_CONFIRM | |
https://www.djangoproject.com/weblog/2021/dec/07/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20211229-0006/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:25.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2021/12/07/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20211229-0006/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-11T02:06:38", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openwall.com/lists/oss-security/2021/12/07/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20211229-0006/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-44420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/3.2/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "name": "https://www.openwall.com/lists/oss-security/2021/12/07/1", "refsource": "CONFIRM", "url": "https://www.openwall.com/lists/oss-security/2021/12/07/1" }, { "name": "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20211229-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20211229-0006/" }, { "name": "FEDORA-2022-e7fd530688", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44420", "datePublished": "2021-12-07T22:55:40", "dateReserved": "2021-11-29T00:00:00", "dateUpdated": "2024-08-04T04:17:25.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22818
Vulnerability from cvelistv5
Published
2022-02-03 00:00
Modified
2024-08-03 03:21
Severity ?
EPSS score ?
Summary
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5254" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-15T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-22818", "datePublished": "2022-02-03T00:00:00", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-08-03T03:21:49.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0305
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 14:18
Severity ?
EPSS score ?
Summary
The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2013/feb/19/security/ | x_refsource_CONFIRM | |
http://ubuntu.com/usn/usn-1757-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2013/dsa-2634 | vendor-advisory, x_refsource_DEBIAN | |
http://rhn.redhat.com/errata/RHSA-2013-0670.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" }, { "name": "USN-1757-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-1757-1" }, { "name": "DSA-2634", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2634" }, { "name": "RHSA-2013:0670", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-15T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" }, { "name": "USN-1757-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-1757-1" }, { "name": "DSA-2634", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2634" }, { "name": "RHSA-2013:0670", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0305", "datePublished": "2013-05-02T14:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23833
Vulnerability from cvelistv5
Published
2022-02-03 00:00
Modified
2024-08-03 03:51
Severity ?
EPSS score ?
Summary
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.008Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-22T23:04:35.819653", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "url": "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a" }, { "url": "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468" }, { "url": "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-23833", "datePublished": "2022-02-03T00:00:00", "dateReserved": "2022-01-21T00:00:00", "dateUpdated": "2024-08-03T03:51:46.008Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-14574
Vulnerability from cvelistv5
Published
2018-08-03 17:00
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2018/aug/01/security-releases/ | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3726-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://www.debian.org/security/2018/dsa-4264 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securitytracker.com/id/1041403 | vdb-entry, x_refsource_SECTRACK | |
https://access.redhat.com/errata/RHSA-2019:0265 | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/104970 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:29:51.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/" }, { "name": "USN-3726-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3726-1/" }, { "name": "DSA-4264", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4264" }, { "name": "1041403", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041403" }, { "name": "RHSA-2019:0265", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "104970", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104970" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-04T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/" }, { "name": "USN-3726-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3726-1/" }, { "name": "DSA-4264", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4264" }, { "name": "1041403", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041403" }, { "name": "RHSA-2019:0265", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "104970", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104970" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-14574", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/" }, { "name": "USN-3726-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3726-1/" }, { "name": "DSA-4264", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4264" }, { "name": "1041403", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041403" }, { "name": "RHSA-2019:0265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "104970", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104970" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-14574", "datePublished": "2018-08-03T17:00:00", "dateReserved": "2018-07-24T00:00:00", "dateUpdated": "2024-08-05T09:29:51.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0221
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "MDVSA-2015:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "FEDORA-2015-0790", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "62718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "MDVSA-2015:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "FEDORA-2015-0790", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0221", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62718", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "MDVSA-2015:036", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "FEDORA-2015-0790", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "https://www.djangoproject.com/weblog/2015/jan/13/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "name": "http://advisories.mageia.org/MGASA-2015-0026.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0221", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41991
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-08-12 15:56
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "lessThan": "4.2.15", "status": "affected", "version": "4.2", "versionType": "custom" }, { "lessThan": "5.0.8", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41991", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T17:57:11.874865Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-12T15:56:42.887Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T14:13:02.341557", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41991", "datePublished": "2024-08-07T00:00:00", "dateReserved": "2024-07-25T00:00:00", "dateUpdated": "2024-08-12T15:56:42.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41989
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-08-08 19:39
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "lessThan": "4.2.15", "status": "affected", "version": "4.2", "versionType": "custom" }, { "lessThan": "5.0.8", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41989", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T19:34:43.299369Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T19:39:24.621Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T14:10:31.266105", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41989", "datePublished": "2024-08-07T00:00:00", "dateReserved": "2024-07-25T00:00:00", "dateUpdated": "2024-08-08T19:39:24.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4136
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
EPSS score ?
Summary
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
References
▼ | URL | Tags |
---|---|---|
https://hermes.opensuse.org/messages/14700881 | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2011/dsa-2332 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.redhat.com/show_bug.cgi?id=737366 | x_refsource_CONFIRM | |
http://secunia.com/advisories/46614 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2011/09/11/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/10/127/ | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/09/13/2 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/09/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:50.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session\u0027s identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4136", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session\u0027s identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2012:0653", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737366", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/10/127/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/09/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4136", "datePublished": "2011-10-19T10:00:00", "dateReserved": "2011-10-19T00:00:00", "dateUpdated": "2024-08-07T00:01:50.498Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5964
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 07:06
Severity ?
EPSS score ?
Summary
The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html | vendor-advisory, x_refsource_FEDORA | |
http://rhn.redhat.com/errata/RHSA-2015-1894.html | vendor-advisory, x_refsource_REDHAT | |
http://www.debian.org/security/2015/dsa-3338 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securitytracker.com/id/1033318 | vdb-entry, x_refsource_SECTRACK | |
http://rhn.redhat.com/errata/RHSA-2015-1767.html | vendor-advisory, x_refsource_REDHAT | |
http://www.ubuntu.com/usn/USN-2720-1 | vendor-advisory, x_refsource_UBUNTU | |
http://rhn.redhat.com/errata/RHSA-2015-1766.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/76440 | vdb-entry, x_refsource_BID | |
https://www.djangoproject.com/weblog/2015/aug/18/security-releases/ | x_refsource_MISC | |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:06:34.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "RHSA-2015:1894", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "name": "DSA-3338", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3338" }, { "name": "1033318", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033318" }, { "name": "RHSA-2015:1767", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "name": "USN-2720-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "name": "RHSA-2015:1766", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "name": "76440", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76440" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "RHSA-2015:1894", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "name": "DSA-3338", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3338" }, { "name": "1033318", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033318" }, { "name": "RHSA-2015:1767", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "name": "USN-2720-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "name": "RHSA-2015:1766", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "name": "76440", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76440" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5964", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-1dd5bc998f", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "RHSA-2015:1894", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "name": "DSA-3338", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3338" }, { "name": "1033318", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033318" }, { "name": "RHSA-2015:1767", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "name": "USN-2720-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "name": "RHSA-2015:1766", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "name": "76440", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76440" }, { "name": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/", "refsource": "MISC", "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5964", "datePublished": "2015-08-24T14:00:00", "dateReserved": "2015-08-07T00:00:00", "dateUpdated": "2024-08-06T07:06:34.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19118
Vulnerability from cvelistv5
Published
2019-12-02 13:16
Modified
2024-08-05 02:09
Severity ?
EPSS score ?
Summary
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
References
▼ | URL | Tags |
---|---|---|
https://docs.djangoproject.com/en/dev/releases/security/ | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2019/12/02/1 | mailing-list, x_refsource_MLIST | |
https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2019/dec/02/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20191217-0003/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202004-17 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:09:39.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "[oss-security] 20191202 Django 2.2.8 and 2.1.15: CVE-2019-19118: Privilege escalation in the Django admin.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/02/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20191217-0003/" }, { "name": "FEDORA-2019-adc8990386", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model\u0027s save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-01T01:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "[oss-security] 20191202 Django 2.2.8 and 2.1.15: CVE-2019-19118: Privilege escalation in the Django admin.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/02/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20191217-0003/" }, { "name": "FEDORA-2019-adc8990386", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model\u0027s save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "[oss-security] 20191202 Django 2.2.8 and 2.1.15: CVE-2019-19118: Privilege escalation in the Django admin.", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/12/02/1" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ" }, { "name": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20191217-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20191217-0003/" }, { "name": "FEDORA-2019-adc8990386", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19118", "datePublished": "2019-12-02T13:16:34", "dateReserved": "2019-11-19T00:00:00", "dateUpdated": "2024-08-05T02:09:39.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4138
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
EPSS score ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.
References
▼ | URL | Tags |
---|---|---|
https://hermes.opensuse.org/messages/14700881 | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2011/dsa-2332 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.redhat.com/show_bug.cgi?id=737366 | x_refsource_CONFIRM | |
http://secunia.com/advisories/46614 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2011/09/11/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/10/127/ | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/09/13/2 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/09/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:51.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL\u0027s validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL\u0027s validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2012:0653", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737366", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/10/127/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/09/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4138", "datePublished": "2011-10-19T10:00:00", "dateReserved": "2011-10-19T00:00:00", "dateUpdated": "2024-08-07T00:01:51.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16984
Vulnerability from cvelistv5
Published
2018-10-02 18:00
Modified
2024-08-05 10:39
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2018/oct/01/security-release/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1041749 | vdb-entry, x_refsource_SECTRACK | |
https://security.netapp.com/advisory/ntap-20190502-0009/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:39:58.059Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2018/oct/01/security-release/" }, { "name": "1041749", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041749" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190502-0009/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-01T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the \"view\" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-02T09:06:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2018/oct/01/security-release/" }, { "name": "1041749", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041749" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190502-0009/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the \"view\" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2018/oct/01/security-release/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2018/oct/01/security-release/" }, { "name": "1041749", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041749" }, { "name": "https://security.netapp.com/advisory/ntap-20190502-0009/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190502-0009/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16984", "datePublished": "2018-10-02T18:00:00", "dateReserved": "2018-09-13T00:00:00", "dateUpdated": "2024-08-05T10:39:58.059Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0696
Vulnerability from cvelistv5
Published
2011-02-14 20:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:26.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43297" }, { "name": "43382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43382" }, { "name": "ADV-2011-0439", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "name": "ADV-2011-0429", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "name": "43230", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43230" }, { "name": "43426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676357" }, { "name": "ADV-2011-0372", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "name": "FEDORA-2011-1261", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "name": "ADV-2011-0441", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "name": "USN-1066-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "name": "46296", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46296" }, { "name": "MDVSA-2011:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "name": "DSA-2163", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2163" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "name": "ADV-2011-0388", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "name": "FEDORA-2011-1235", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a \"combination of browser plugins and redirects,\" a related issue to CVE-2011-0447." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-23T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43297" }, { "name": "43382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43382" }, { "name": "ADV-2011-0439", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "name": "ADV-2011-0429", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "name": "43230", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43230" }, { "name": "43426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676357" }, { "name": "ADV-2011-0372", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "name": "FEDORA-2011-1261", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "name": "ADV-2011-0441", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "name": "USN-1066-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "name": "46296", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46296" }, { "name": "MDVSA-2011:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "name": "DSA-2163", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2163" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "name": "ADV-2011-0388", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "name": "FEDORA-2011-1235", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0696", "datePublished": "2011-02-14T20:00:00", "dateReserved": "2011-01-31T00:00:00", "dateUpdated": "2024-08-06T21:58:26.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-13596
Vulnerability from cvelistv5
Published
2020-06-03 13:13
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/4381-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/4381-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://www.debian.org/security/2020/dsa-4705 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/ | vendor-advisory, x_refsource_FEDORA | |
https://www.oracle.com/security-alerts/cpujan2021.html | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.0/releases/security/ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2020/jun/03/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0002/ | x_refsource_CONFIRM | |
https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:25:16.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-4381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "name": "USN-4381-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "name": "DSA-4705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-20T14:42:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-4381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "name": "USN-4381-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "name": "DSA-4705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13596", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-4381-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4381-1/" }, { "name": "USN-4381-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4381-2/" }, { "name": "DSA-4705", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://docs.djangoproject.com/en/3.0/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "name": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" }, { "name": "https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ", "refsource": "MISC", "url": "https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13596", "datePublished": "2020-06-03T13:13:55", "dateReserved": "2020-05-26T00:00:00", "dateUpdated": "2024-08-04T12:25:16.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33203
Vulnerability from cvelistv5
Published
2021-06-08 17:52
Modified
2024-08-03 23:42
Severity ?
EPSS score ?
Summary
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.2/releases/security/ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2021/jun/02/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20210727-0004/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:20.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-11T02:06:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33203", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/3.2/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "name": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20210727-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "name": "FEDORA-2022-e7fd530688", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33203", "datePublished": "2021-06-08T17:52:20", "dateReserved": "2021-05-19T00:00:00", "dateUpdated": "2024-08-03T23:42:20.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3281
Vulnerability from cvelistv5
Published
2021-02-02 06:16
Modified
2024-08-03 16:53
Severity ?
EPSS score ?
Summary
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.1/releases/security/ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2021/feb/01/security-releases/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/ | vendor-advisory, x_refsource_FEDORA | |
https://security.netapp.com/advisory/ntap-20210226-0004/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:53:17.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/" }, { "name": "FEDORA-2021-5329c680f7", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by \"startapp --template\" and \"startproject --template\") allows directory traversal via an archive with absolute paths or relative paths with dot segments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-26T08:06:39", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/" }, { "name": "FEDORA-2021-5329c680f7", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0004/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-3281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by \"startapp --template\" and \"startproject --template\") allows directory traversal via an archive with absolute paths or relative paths with dot segments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/3.1/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "name": "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/" }, { "name": "FEDORA-2021-5329c680f7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/" }, { "name": "https://security.netapp.com/advisory/ntap-20210226-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210226-0004/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-3281", "datePublished": "2021-02-02T06:16:28", "dateReserved": "2021-01-22T00:00:00", "dateUpdated": "2024-08-03T16:53:17.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-13254
Vulnerability from cvelistv5
Published
2020-06-03 13:11
Modified
2024-08-04 12:11
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/4381-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/4381-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html | mailing-list, x_refsource_MLIST | |
https://www.debian.org/security/2020/dsa-4705 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/ | vendor-advisory, x_refsource_FEDORA | |
https://www.oracle.com/security-alerts/cpujan2021.html | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.0/releases/security/ | x_refsource_MISC | |
https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2020/jun/03/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0002/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-4381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "name": "USN-4381-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "name": "[debian-lts-announce] 20200612 [SECURITY] [DLA 2233-2] python-django regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html" }, { "name": "DSA-4705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-20T14:42:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-4381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "name": "USN-4381-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "name": "[debian-lts-announce] 20200612 [SECURITY] [DLA 2233-2] python-django regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html" }, { "name": "DSA-4705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-4381-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4381-1/" }, { "name": "USN-4381-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4381-2/" }, { "name": "[debian-lts-announce] 20200612 [SECURITY] [DLA 2233-2] python-django regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html" }, { "name": "DSA-4705", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://docs.djangoproject.com/en/3.0/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "name": "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ", "refsource": "MISC", "url": "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" }, { "name": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13254", "datePublished": "2020-06-03T13:11:57", "dateReserved": "2020-05-21T00:00:00", "dateUpdated": "2024-08-04T12:11:19.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32052
Vulnerability from cvelistv5
Published
2021-05-06 15:49
Modified
2024-08-03 23:17
Severity ?
EPSS score ?
Summary
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.2/releases/security/ | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/06/1 | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2021/may/06/security-releases/ | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/ | vendor-advisory, x_refsource_FEDORA | |
https://security.netapp.com/advisory/ntap-20210611-0002/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:17:28.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/06/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/may/06/security-releases/" }, { "name": "FEDORA-2021-01044b8a59", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-11T10:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/06/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.djangoproject.com/weblog/2021/may/06/security-releases/" }, { "name": "FEDORA-2021-01044b8a59", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0002/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-32052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/3.2/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "name": "http://www.openwall.com/lists/oss-security/2021/05/06/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2021/05/06/1" }, { "name": "https://www.djangoproject.com/weblog/2021/may/06/security-releases/", "refsource": "MISC", "url": "https://www.djangoproject.com/weblog/2021/may/06/security-releases/" }, { "name": "FEDORA-2021-01044b8a59", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "name": "https://security.netapp.com/advisory/ntap-20210611-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210611-0002/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-32052", "datePublished": "2021-05-06T15:49:20", "dateReserved": "2021-05-05T00:00:00", "dateUpdated": "2024-08-03T23:17:28.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0222
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "FEDORA-2015-0790", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "FEDORA-2015-0790", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0222", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-0804", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "FEDORA-2015-0790", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "https://www.djangoproject.com/weblog/2015/jan/13/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "name": "http://advisories.mageia.org/MGASA-2015-0026.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0222", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4137
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
EPSS score ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2011/09/15/5 | mailing-list, x_refsource_MLIST | |
https://hermes.opensuse.org/messages/14700881 | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2011/dsa-2332 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.redhat.com/show_bug.cgi?id=737366 | x_refsource_CONFIRM | |
http://secunia.com/advisories/46614 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2011/09/11/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/10/127/ | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/09/13/2 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/09/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:50.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/15/5" }, { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/15/5" }, { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/15/5" }, { "name": "openSUSE-SU-2012:0653", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737366", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/10/127/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/09/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4137", "datePublished": "2011-10-19T10:00:00", "dateReserved": "2011-10-19T00:00:00", "dateUpdated": "2024-08-07T00:01:50.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4534
Vulnerability from cvelistv5
Published
2011-01-10 19:18
Modified
2024-08-07 03:51
Severity ?
EPSS score ?
Summary
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:51:17.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "45562", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45562" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/" }, { "name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "name": "20101223 Django admin list filter data extraction / leakage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/515446" }, { "name": "USN-1040-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "name": "42913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42913" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.djangoproject.com/changeset/15031" }, { "name": "ADV-2011-0048", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "name": "ADV-2011-0098", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "name": "FEDORA-2011-0096", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" }, { "name": "20101223 Django admin list filter data extraction / leakage", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html" }, { "name": "42715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42715" }, { "name": "FEDORA-2011-0120", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "name": "42827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42827" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-19T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "45562", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45562" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/" }, { "name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "name": "20101223 Django admin list filter data extraction / leakage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/515446" }, { "name": "USN-1040-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "name": "42913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42913" }, { "tags": [ "x_refsource_MISC" ], "url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.djangoproject.com/changeset/15031" }, { "name": "ADV-2011-0048", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "name": "ADV-2011-0098", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "name": "FEDORA-2011-0096", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" }, { "name": "20101223 Django admin list filter data extraction / leakage", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html" }, { "name": "42715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42715" }, { "name": "FEDORA-2011-0120", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "name": "42827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42827" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4534", "datePublished": "2011-01-10T19:18:00", "dateReserved": "2010-12-09T00:00:00", "dateUpdated": "2024-08-07T03:51:17.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19844
Vulnerability from cvelistv5
Published
2019-12-18 18:07
Modified
2024-08-05 02:25
Severity ?
EPSS score ?
Summary
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
References
▼ | URL | Tags |
---|---|---|
https://docs.djangoproject.com/en/dev/releases/security/ | x_refsource_MISC | |
https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0 | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2019/dec/18/security-releases/ | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4224-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://www.debian.org/security/2020/dsa-4598 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2020/Jan/9 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200110-0003/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202004-17 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/" }, { "name": "USN-4224-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4224-1/" }, { "name": "DSA-4598", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4598" }, { "name": "20200108 [SECURITY] [DSA 4598-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Jan/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200110-0003/" }, { "name": "FEDORA-2020-adb4f0143a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user\u0027s email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-01T01:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/" }, { "name": "USN-4224-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4224-1/" }, { "name": "DSA-4598", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4598" }, { "name": "20200108 [SECURITY] [DSA 4598-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Jan/9" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200110-0003/" }, { "name": "FEDORA-2020-adb4f0143a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19844", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user\u0027s email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0" }, { "name": "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/" }, { "name": "USN-4224-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4224-1/" }, { "name": "DSA-4598", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4598" }, { "name": "20200108 [SECURITY] [DSA 4598-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Jan/9" }, { "name": "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200110-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200110-0003/" }, { "name": "FEDORA-2020-adb4f0143a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19844", "datePublished": "2019-12-18T18:07:11", "dateReserved": "2019-12-17T00:00:00", "dateUpdated": "2024-08-05T02:25:12.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36053
Vulnerability from cvelistv5
Published
2023-07-03 00:00
Modified
2024-08-02 16:37
Severity ?
EPSS score ?
Summary
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "debian_linux", "vendor": "debian", "versions": [ { "status": "affected", "version": "10.0" } ] }, { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "status": "affected", "version": "37" } ] }, { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "status": "affected", "version": "*" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-36053", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T16:03:28.124119Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333 Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:25:43.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:41.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/" }, { "name": "[debian-lts-announce] 20230719 [SECURITY] [DLA 3500-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html" }, { "name": "DSA-5465", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5465" }, { "name": "FEDORA-2023-cc023fabb7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/" }, { "name": "FEDORA-2023-9d36d373f1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-20T03:05:57.133777", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/" }, { "name": "[debian-lts-announce] 20230719 [SECURITY] [DLA 3500-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html" }, { "name": "DSA-5465", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5465" }, { "name": "FEDORA-2023-cc023fabb7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/" }, { "name": "FEDORA-2023-9d36d373f1", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-36053", "datePublished": "2023-07-03T00:00:00", "dateReserved": "2023-06-20T00:00:00", "dateUpdated": "2024-08-02T16:37:41.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0472
Vulnerability from cvelistv5
Published
2014-04-23 14:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-2169-1 | vendor-advisory, x_refsource_UBUNTU | |
https://www.djangoproject.com/weblog/2014/apr/21/security/ | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2014-0457.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2014/dsa-2934 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2014-0456.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:17.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2169-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a \"dotted Python path.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "USN-2169-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-0472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a \"dotted Python path.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2169-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "name": "https://www.djangoproject.com/weblog/2014/apr/21/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-0472", "datePublished": "2014-04-23T14:00:00", "dateReserved": "2013-12-19T00:00:00", "dateUpdated": "2024-08-06T09:20:17.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34265
Vulnerability from cvelistv5
Published
2022-07-04 00:00
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220818-0006/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-28T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/" }, { "url": "https://security.netapp.com/advisory/ntap-20220818-0006/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-34265", "datePublished": "2022-07-04T00:00:00", "dateReserved": "2022-06-21T00:00:00", "dateUpdated": "2024-08-03T09:07:16.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43665
Vulnerability from cvelistv5
Published
2023-11-03 00:00
Modified
2024-08-02 19:44
Severity ?
EPSS score ?
Summary
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/" }, { "name": "FEDORA-2023-a67af7d8f4", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231221-0001/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "name": "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T17:09:51.000328", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/" }, { "name": "FEDORA-2023-a67af7d8f4", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "url": "https://security.netapp.com/advisory/ntap-20231221-0001/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "name": "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-43665", "datePublished": "2023-11-03T00:00:00", "dateReserved": "2023-09-20T00:00:00", "dateUpdated": "2024-08-02T19:44:43.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12794
Vulnerability from cvelistv5
Published
2017-09-07 13:00
Modified
2024-08-05 18:51
Severity ?
EPSS score ?
Summary
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/3559-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/100643 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1039264 | vdb-entry, x_refsource_SECTRACK | |
https://www.djangoproject.com/weblog/2017/sep/05/security-releases/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:51:07.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3559-1/" }, { "name": "100643", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100643" }, { "name": "1039264", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039264" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn\u0027t affect most production sites since you shouldn\u0027t run with \"DEBUG = True\" (which makes this page accessible) in your production settings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3559-1/" }, { "name": "100643", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100643" }, { "name": "1039264", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039264" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12794", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn\u0027t affect most production sites since you shouldn\u0027t run with \"DEBUG = True\" (which makes this page accessible) in your production settings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3559-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3559-1/" }, { "name": "100643", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100643" }, { "name": "1039264", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039264" }, { "name": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12794", "datePublished": "2017-09-07T13:00:00", "dateReserved": "2017-08-10T00:00:00", "dateUpdated": "2024-08-05T18:51:07.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-6975
Vulnerability from cvelistv5
Published
2019-02-11 13:00
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2019/feb/11/security-releases/ | x_refsource_MISC | |
https://docs.djangoproject.com/en/dev/releases/security/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/106964 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/3890-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://www.openwall.com/lists/oss-security/2019/02/11/1 | x_refsource_MISC | |
https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/ | vendor-advisory, x_refsource_FEDORA | |
https://www.debian.org/security/2019/dsa-4476 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jul/10 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:32.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "106964", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106964" }, { "name": "USN-3890-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3890-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2019/02/11/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ" }, { "name": "FEDORA-2019-5ad2149e99", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" }, { "name": "FEDORA-2019-f528d75a69", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/" }, { "name": "DSA-4476", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-08T14:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "106964", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106964" }, { "name": "USN-3890-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3890-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2019/02/11/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ" }, { "name": "FEDORA-2019-5ad2149e99", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" }, { "name": "FEDORA-2019-f528d75a69", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/" }, { "name": "DSA-4476", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6975", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/", "refsource": "MISC", "url": "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/" }, { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "106964", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106964" }, { "name": "USN-3890-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3890-1/" }, { "name": "https://www.openwall.com/lists/oss-security/2019/02/11/1", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2019/02/11/1" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ" }, { "name": "FEDORA-2019-5ad2149e99", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" }, { "name": "FEDORA-2019-f528d75a69", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/" }, { "name": "DSA-4476", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jul/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-6975", "datePublished": "2019-02-11T13:00:00", "dateReserved": "2019-01-26T00:00:00", "dateUpdated": "2024-08-04T20:38:32.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46695
Vulnerability from cvelistv5
Published
2023-11-02 00:00
Modified
2024-08-02 20:53
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:20.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231214-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T10:06:39.801548", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/" }, { "url": "https://security.netapp.com/advisory/ntap-20231214-0001/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-46695", "datePublished": "2023-11-02T00:00:00", "dateReserved": "2023-10-25T00:00:00", "dateUpdated": "2024-08-02T20:53:20.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2512
Vulnerability from cvelistv5
Published
2016-04-08 15:00
Modified
2024-08-05 23:32
Severity ?
EPSS score ?
Summary
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:32:20.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0506", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "name": "1035152", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035152" }, { "name": "83879", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/83879" }, { "name": "RHSA-2016:0504", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "name": "DSA-3544", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3544" }, { "name": "RHSA-2016:0502", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "name": "USN-2915-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2915-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "name": "RHSA-2016:0505", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "name": "USN-2915-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\\@attacker.com." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2016:0506", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "name": "1035152", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035152" }, { "name": "83879", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/83879" }, { "name": "RHSA-2016:0504", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "name": "DSA-3544", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3544" }, { "name": "RHSA-2016:0502", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "name": "USN-2915-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2915-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "name": "RHSA-2016:0505", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "name": "USN-2915-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-2512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\\@attacker.com." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:0506", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "name": "1035152", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035152" }, { "name": "83879", "refsource": "BID", "url": "http://www.securityfocus.com/bid/83879" }, { "name": "RHSA-2016:0504", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "name": "DSA-3544", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3544" }, { "name": "RHSA-2016:0502", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "name": "USN-2915-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2915-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "name": "RHSA-2016:0505", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "name": "USN-2915-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "name": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" }, { "name": "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-2512", "datePublished": "2016-04-08T15:00:00", "dateReserved": "2016-02-19T00:00:00", "dateUpdated": "2024-08-05T23:32:20.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45231
Vulnerability from cvelistv5
Published
2024-10-08 00:00
Modified
2024-10-30 16:37
Severity ?
EPSS score ?
Summary
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "lessThan": "5.1.1", "status": "affected", "version": "5.1", "versionType": "custom" }, { "lessThan": "5.0.9", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThan": "4.2.16", "status": "affected", "version": "4.2", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45231", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-30T16:35:34.672082Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T16:37:12.474Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T15:12:36.486526", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-45231", "datePublished": "2024-10-08T00:00:00", "dateReserved": "2024-08-24T00:00:00", "dateUpdated": "2024-10-30T16:37:12.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0480
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2014/aug/20/security/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/69425 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/61276 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2014/dsa-3010 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/59782 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:18.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "69425", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69425" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59782" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "69425", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69425" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59782" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-0480", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2014/aug/20/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "69425", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69425" }, { "name": "61276", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59782" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-0480", "datePublished": "2014-08-26T14:00:00", "dateReserved": "2013-12-19T00:00:00", "dateUpdated": "2024-08-06T09:20:18.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7536
Vulnerability from cvelistv5
Published
2018-03-09 00:00
Modified
2024-08-05 06:31
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3591-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "name": "RHSA-2019:0051", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0051" }, { "name": "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "name": "103361", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103361" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" }, { "name": "RHSA-2019:0082", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0082" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "RHSA-2019:0265", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "DSA-4161", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4161" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-07T22:05:43.713862", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3591-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "name": "RHSA-2019:0051", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0051" }, { "name": "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "name": "103361", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/103361" }, { "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" }, { "name": "RHSA-2019:0082", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0082" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "RHSA-2019:0265", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "DSA-4161", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2018/dsa-4161" }, { "url": "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2" }, { "url": "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16" }, { "url": "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7536", "datePublished": "2018-03-09T00:00:00", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-08-05T06:31:04.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-9014
Vulnerability from cvelistv5
Published
2016-12-09 20:00
Modified
2024-08-06 02:35
Severity ?
EPSS score ?
Summary
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2016/nov/01/security-releases/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/ | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/94068 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2017/dsa-3835 | vendor-advisory, x_refsource_DEBIAN | |
http://www.ubuntu.com/usn/USN-3115-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securitytracker.com/id/1037159 | vdb-entry, x_refsource_SECTRACK | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:35:02.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "name": "FEDORA-2016-d4571bf555", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "name": "94068", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94068" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "USN-3115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "name": "1037159", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037159" }, { "name": "FEDORA-2016-3eb5a55123", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "name": "FEDORA-2016-d4571bf555", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "name": "94068", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94068" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "USN-3115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "name": "1037159", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037159" }, { "name": "FEDORA-2016-3eb5a55123", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-9014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "name": "FEDORA-2016-d4571bf555", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "name": "94068", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94068" }, { "name": "DSA-3835", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "USN-3115-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "name": "1037159", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037159" }, { "name": "FEDORA-2016-3eb5a55123", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-9014", "datePublished": "2016-12-09T20:00:00", "dateReserved": "2016-10-25T00:00:00", "dateUpdated": "2024-08-06T02:35:02.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0482
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2014/aug/20/security/ | x_refsource_CONFIRM | |
http://secunia.com/advisories/61276 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2014/dsa-3010 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/59782 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:18.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59782" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59782" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-0482", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2014/aug/20/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59782" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-0482", "datePublished": "2014-08-26T14:00:00", "dateReserved": "2013-12-19T00:00:00", "dateUpdated": "2024-08-06T09:20:18.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2048
Vulnerability from cvelistv5
Published
2016-02-08 19:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/82329 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1034894 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/" }, { "name": "82329", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/82329" }, { "name": "1034894", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034894" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the \"Save as New\" option when editing objects and leveraging the \"change\" permission." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/" }, { "name": "82329", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/82329" }, { "name": "1034894", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034894" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-2048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the \"Save as New\" option when editing objects and leveraging the \"change\" permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/" }, { "name": "82329", "refsource": "BID", "url": "http://www.securityfocus.com/bid/82329" }, { "name": "1034894", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034894" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-2048", "datePublished": "2016-02-08T19:00:00", "dateReserved": "2016-01-24T00:00:00", "dateUpdated": "2024-08-05T23:17:50.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2241
Vulnerability from cvelistv5
Published
2015-03-12 14:00
Modified
2024-08-06 05:10
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/73095 | vdb-entry, x_refsource_BID | |
https://code.djangoproject.com/ticket/24461 | x_refsource_CONFIRM | |
https://www.djangoproject.com/weblog/2015/mar/09/security-releases/ | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:109 | vendor-advisory, x_refsource_MANDRIVA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:15.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "73095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.djangoproject.com/ticket/24461" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "73095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.djangoproject.com/ticket/24461" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2241", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "73095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73095" }, { "name": "https://code.djangoproject.com/ticket/24461", "refsource": "CONFIRM", "url": "https://code.djangoproject.com/ticket/24461" }, { "name": "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/" }, { "name": "MDVSA-2015:109", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2241", "datePublished": "2015-03-12T14:00:00", "dateReserved": "2015-03-09T00:00:00", "dateUpdated": "2024-08-06T05:10:15.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41323
Vulnerability from cvelistv5
Published
2022-10-16 00:00
Modified
2024-08-03 12:42
Severity ?
EPSS score ?
Summary
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:42:45.749Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221124-0001/" }, { "name": "FEDORA-2023-3d775d93be", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "name": "FEDORA-2023-bde7913e5a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "name": "FEDORA-2023-a74513bda8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-28T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/" }, { "url": "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924" }, { "url": "https://security.netapp.com/advisory/ntap-20221124-0001/" }, { "name": "FEDORA-2023-3d775d93be", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "name": "FEDORA-2023-bde7913e5a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "name": "FEDORA-2023-a74513bda8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-41323", "datePublished": "2022-10-16T00:00:00", "dateReserved": "2022-09-23T00:00:00", "dateUpdated": "2024-08-03T12:42:45.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56374
Vulnerability from cvelistv5
Published
2025-01-14 00:00
Modified
2025-01-14 19:07
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | djangoproject | Django |
Version: 4.2 < 4.2.18 Version: 5.0 < 5.0.11 Version: 5.1 < 5.1.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-01-14T19:02:43.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/01/14/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Django", "vendor": "djangoproject", "versions": [ { "lessThan": "4.2.18", "status": "affected", "version": "4.2", "versionType": "custom" }, { "lessThan": "5.0.11", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThan": "5.1.5", "status": "affected", "version": "5.1", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.2.18", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.0.11", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.1.5", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-14T19:07:03.855Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/g/django-announce" }, { "url": "https://www.djangoproject.com/weblog/2025/jan/14/security-releases/" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-56374", "datePublished": "2025-01-14T00:00:00", "dateReserved": "2024-12-22T00:00:00", "dateUpdated": "2025-01-14T19:07:03.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1418
Vulnerability from cvelistv5
Published
2014-05-16 15:00
Modified
2024-08-06 09:42
Severity ?
EPSS score ?
Summary
Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2014/dsa-2934 | vendor-advisory, x_refsource_DEBIAN | |
http://ubuntu.com/usn/usn-2212-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://www.openwall.com/lists/oss-security/2014/05/15/3 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/05/14/10 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:42:35.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "USN-2212-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2212-1" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "name": "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "USN-2212-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2212-1" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "name": "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2014-1418", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "USN-2212-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2212-1" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "name": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "name": "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2014-1418", "datePublished": "2014-05-16T15:00:00", "dateReserved": "2014-01-13T00:00:00", "dateUpdated": "2024-08-06T09:42:35.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3730
Vulnerability from cvelistv5
Published
2014-05-16 15:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2014/dsa-2934 | vendor-advisory, x_refsource_DEBIAN | |
http://ubuntu.com/usn/usn-2212-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/67410 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://www.openwall.com/lists/oss-security/2014/05/15/3 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/05/14/10 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:18.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "USN-2212-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2212-1" }, { "name": "67410", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67410" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "name": "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by \"http:\\\\\\djangoproject.com.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "USN-2212-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2212-1" }, { "name": "67410", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67410" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "name": "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-3730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by \"http:\\\\\\djangoproject.com.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "USN-2212-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2212-1" }, { "name": "67410", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67410" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "name": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "name": "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-3730", "datePublished": "2014-05-16T15:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:18.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2317
Vulnerability from cvelistv5
Published
2015-03-25 14:00
Modified
2024-08-06 05:10
Severity ?
EPSS score ?
Summary
The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
References
▼ | URL | Tags |
---|---|---|
http://ubuntu.com/usn/usn-2539-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/73319 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2015/dsa-3204 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:195 | vendor-advisory, x_refsource_MANDRIVA | |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html | vendor-advisory, x_refsource_SUSE | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html | vendor-advisory, x_refsource_FEDORA | |
https://www.djangoproject.com/weblog/2015/mar/18/security-releases/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:16.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2539-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2539-1" }, { "name": "73319", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73319" }, { "name": "DSA-3204", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3204" }, { "name": "FEDORA-2015-5766", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "MDVSA-2015:195", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "FEDORA-2015-9604", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \\x08javascript: URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-2539-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2539-1" }, { "name": "73319", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73319" }, { "name": "DSA-3204", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3204" }, { "name": "FEDORA-2015-5766", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "MDVSA-2015:195", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "FEDORA-2015-9604", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \\x08javascript: URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2539-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2539-1" }, { "name": "73319", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73319" }, { "name": "DSA-3204", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3204" }, { "name": "FEDORA-2015-5766", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "name": "openSUSE-SU-2015:1598", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "MDVSA-2015:195", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195" }, { "name": "openSUSE-SU-2015:0643", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "FEDORA-2015-9604", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html" }, { "name": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2317", "datePublished": "2015-03-25T14:00:00", "dateReserved": "2015-03-17T00:00:00", "dateUpdated": "2024-08-06T05:10:16.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35042
Vulnerability from cvelistv5
Published
2021-07-02 09:54
Modified
2024-08-04 00:33
Severity ?
EPSS score ?
Summary
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.2/releases/security/ | x_refsource_MISC | |
https://www.openwall.com/lists/oss-security/2021/07/02/2 | x_refsource_CONFIRM | |
https://www.djangoproject.com/weblog/2021/jul/01/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20210805-0008/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:49.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2021/07/02/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210805-0008/" }, { "name": "FEDORA-2021-78e501d62a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-18T02:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openwall.com/lists/oss-security/2021/07/02/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210805-0008/" }, { "name": "FEDORA-2021-78e501d62a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/3.2/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "name": "https://www.openwall.com/lists/oss-security/2021/07/02/2", "refsource": "CONFIRM", "url": "https://www.openwall.com/lists/oss-security/2021/07/02/2" }, { "name": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20210805-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210805-0008/" }, { "name": "FEDORA-2021-78e501d62a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35042", "datePublished": "2021-07-02T09:54:11", "dateReserved": "2021-06-18T00:00:00", "dateUpdated": "2024-08-04T00:33:49.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4249
Vulnerability from cvelistv5
Published
2013-10-04 17:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1028915 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/54476 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2013/q3/369 | mailing-list, x_refsource_MLIST | |
https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86438 | vdb-entry, x_refsource_XF | |
https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued | x_refsource_CONFIRM | |
https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2013/q3/411 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1028915", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1028915" }, { "name": "54476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54476" }, { "name": "[oss-security] 20130814 [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78" }, { "name": "django-administrative-xss(86438)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560" }, { "name": "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1028915", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1028915" }, { "name": "54476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54476" }, { "name": "[oss-security] 20130814 [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78" }, { "name": "django-administrative-xss(86438)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560" }, { "name": "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/411" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4249", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1028915", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1028915" }, { "name": "54476", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54476" }, { "name": "[oss-security] 20130814 [CVE request] Django 1.4.6 security release", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "name": "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78" }, { "name": "django-administrative-xss(86438)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438" }, { "name": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "name": "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560" }, { "name": "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/411" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4249", "datePublished": "2013-10-04T17:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28346
Vulnerability from cvelistv5
Published
2022-04-12 00:00
Modified
2024-08-03 05:56
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:56:14.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" }, { "name": "[debian-lts-announce] 20220414 [SECURITY] [DLA 2982-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220609-0002/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-28T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" }, { "name": "[debian-lts-announce] 20220414 [SECURITY] [DLA 2982-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html" }, { "url": "https://security.netapp.com/advisory/ntap-20220609-0002/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28346", "datePublished": "2022-04-12T00:00:00", "dateReserved": "2022-04-02T00:00:00", "dateUpdated": "2024-08-03T05:56:14.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7401
Vulnerability from cvelistv5
Published
2016-10-03 18:00
Modified
2024-08-06 01:57
Severity ?
EPSS score ?
Summary
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2016/dsa-3678 | vendor-advisory, x_refsource_DEBIAN | |
http://rhn.redhat.com/errata/RHSA-2016-2040.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2043.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id/1036899 | vdb-entry, x_refsource_SECTRACK | |
http://rhn.redhat.com/errata/RHSA-2016-2041.html | vendor-advisory, x_refsource_REDHAT | |
https://www.djangoproject.com/weblog/2016/sep/26/security-releases/ | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-2042.html | vendor-advisory, x_refsource_REDHAT | |
http://www.ubuntu.com/usn/USN-3089-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/93182 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2016-2038.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2016-2039.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:57:47.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-3678", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3678" }, { "name": "RHSA-2016:2040", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2040.html" }, { "name": "RHSA-2016:2043", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2043.html" }, { "name": "1036899", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036899" }, { "name": "RHSA-2016:2041", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2041.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/" }, { "name": "RHSA-2016:2042", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2042.html" }, { "name": "USN-3089-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3089-1" }, { "name": "93182", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93182" }, { "name": "RHSA-2016:2038", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2038.html" }, { "name": "RHSA-2016:2039", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2039.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-09-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-3678", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3678" }, { "name": "RHSA-2016:2040", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2040.html" }, { "name": "RHSA-2016:2043", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2043.html" }, { "name": "1036899", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036899" }, { "name": "RHSA-2016:2041", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2041.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/" }, { "name": "RHSA-2016:2042", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2042.html" }, { "name": "USN-3089-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3089-1" }, { "name": "93182", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93182" }, { "name": "RHSA-2016:2038", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2038.html" }, { "name": "RHSA-2016:2039", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2039.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7401", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-3678", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3678" }, { "name": "RHSA-2016:2040", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2040.html" }, { "name": "RHSA-2016:2043", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2043.html" }, { "name": "1036899", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036899" }, { "name": "RHSA-2016:2041", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2041.html" }, { "name": "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/" }, { "name": "RHSA-2016:2042", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2042.html" }, { "name": "USN-3089-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3089-1" }, { "name": "93182", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93182" }, { "name": "RHSA-2016:2038", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2038.html" }, { "name": "RHSA-2016:2039", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2039.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7401", "datePublished": "2016-10-03T18:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T01:57:47.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24584
Vulnerability from cvelistv5
Published
2020-09-01 12:36
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:08.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-4479-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "name": "FEDORA-2020-94407454d7", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "name": "FEDORA-2020-6941c0a65b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "name": "FEDORA-2020-9c6b391162", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system\u0027s standard umask rather than 0o077." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-20T14:42:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-4479-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "name": "FEDORA-2020-94407454d7", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "name": "FEDORA-2020-6941c0a65b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "name": "FEDORA-2020-9c6b391162", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24584", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system\u0027s standard umask rather than 0o077." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-4479-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4479-1/" }, { "name": "FEDORA-2020-94407454d7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "name": "FEDORA-2020-6941c0a65b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "name": "FEDORA-2020-9c6b391162", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM" }, { "name": "https://www.openwall.com/lists/oss-security/2020/09/01/2", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "name": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/", "refsource": "MISC", "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20200918-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24584", "datePublished": "2020-09-01T12:36:06", "dateReserved": "2020-08-21T00:00:00", "dateUpdated": "2024-08-04T15:19:08.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3695
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:38
Severity ?
EPSS score ?
Summary
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/36655 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53727 | vdb-entry, x_refsource_XF | |
http://www.djangoproject.com/weblog/2009/oct/09/security/ | x_refsource_CONFIRM | |
http://secunia.com/advisories/36948 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/36968 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2009/dsa-1905 | vendor-advisory, x_refsource_DEBIAN | |
http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/ | x_refsource_MISC | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2009/10/13/6 | mailing-list, x_refsource_MLIST | |
http://www.vupen.com/english/advisories/2009/2871 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:38:30.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36655", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36655" }, { "name": "django-emailfield-urlfield-dos(53727)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.djangoproject.com/weblog/2009/oct/09/security/" }, { "name": "36948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36948" }, { "name": "36968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36968" }, { "name": "DSA-1905", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1905" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457" }, { "name": "[oss-security] 20091013 Re: Duplicate CVE assignment notification [was: CVE id request: django]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/13/6" }, { "name": "ADV-2009-2871", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2871" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "36655", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36655" }, { "name": "django-emailfield-urlfield-dos(53727)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.djangoproject.com/weblog/2009/oct/09/security/" }, { "name": "36948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36948" }, { "name": "36968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36968" }, { "name": "DSA-1905", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1905" }, { "tags": [ "x_refsource_MISC" ], "url": "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457" }, { "name": "[oss-security] 20091013 Re: Duplicate CVE assignment notification [was: CVE id request: django]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/13/6" }, { "name": "ADV-2009-2871", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2871" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3695", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36655", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36655" }, { "name": "django-emailfield-urlfield-dos(53727)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727" }, { "name": "http://www.djangoproject.com/weblog/2009/oct/09/security/", "refsource": "CONFIRM", "url": "http://www.djangoproject.com/weblog/2009/oct/09/security/" }, { "name": "36948", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36948" }, { "name": "36968", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36968" }, { "name": "DSA-1905", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1905" }, { "name": "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/", "refsource": "MISC", "url": "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457" }, { "name": "[oss-security] 20091013 Re: Duplicate CVE assignment notification [was: CVE id request: django]", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/10/13/6" }, { "name": "ADV-2009-2871", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2871" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3695", "datePublished": "2009-10-13T10:00:00", "dateReserved": "2009-10-13T00:00:00", "dateUpdated": "2024-08-07T06:38:30.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0219
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "MDVSA-2015:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "FEDORA-2015-0790", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2469-1" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "62718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "MDVSA-2015:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "FEDORA-2015-0790", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2469-1" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0219", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62718", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "MDVSA-2015:036", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "FEDORA-2015-0790", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "name": "62285", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "https://www.djangoproject.com/weblog/2015/jan/13/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "USN-2469-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2469-1" }, { "name": "openSUSE-SU-2015:0643", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "name": "http://advisories.mageia.org/MGASA-2015-0026.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0219", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14235
Vulnerability from cvelistv5
Published
2019-08-02 14:34
Modified
2024-08-05 00:12
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
References
▼ | URL | Tags |
---|---|---|
https://docs.djangoproject.com/en/dev/releases/security/ | x_refsource_MISC | |
https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2019/aug/01/security-releases/ | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html | vendor-advisory, x_refsource_SUSE | |
https://seclists.org/bugtraq/2019/Aug/15 | mailing-list, x_refsource_BUGTRAQ | |
https://www.debian.org/security/2019/dsa-4498 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/ | vendor-advisory, x_refsource_FEDORA | |
https://security.netapp.com/advisory/ntap-20190828-0002/ | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202004-17 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:42.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-01T01:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs" }, { "name": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "name": "https://security.netapp.com/advisory/ntap-20190828-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14235", "datePublished": "2019-08-02T14:34:22", "dateReserved": "2019-07-22T00:00:00", "dateUpdated": "2024-08-05T00:12:42.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8213
Vulnerability from cvelistv5
Published
2015-12-07 20:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:31.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4" }, { "name": "openSUSE-SU-2015:2199", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html" }, { "name": "USN-2816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2816-1" }, { "name": "RHSA-2016:0129", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0129.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/" }, { "name": "FEDORA-2015-323274d412", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html" }, { "name": "1034237", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034237" }, { "name": "RHSA-2016:0158", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0158.html" }, { "name": "RHSA-2016:0157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0157.html" }, { "name": "DSA-3404", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3404" }, { "name": "RHSA-2016:0156", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0156.html" }, { "name": "77750", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77750" }, { "name": "FEDORA-2015-a8c8f60fbd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html" }, { "name": "openSUSE-SU-2015:2202", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4" }, { "name": "openSUSE-SU-2015:2199", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html" }, { "name": "USN-2816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2816-1" }, { "name": "RHSA-2016:0129", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0129.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/" }, { "name": "FEDORA-2015-323274d412", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html" }, { "name": "1034237", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034237" }, { "name": "RHSA-2016:0158", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0158.html" }, { "name": "RHSA-2016:0157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0157.html" }, { "name": "DSA-3404", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3404" }, { "name": "RHSA-2016:0156", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0156.html" }, { "name": "77750", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77750" }, { "name": "FEDORA-2015-a8c8f60fbd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html" }, { "name": "openSUSE-SU-2015:2202", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4" }, { "name": "openSUSE-SU-2015:2199", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html" }, { "name": "USN-2816-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2816-1" }, { "name": "RHSA-2016:0129", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0129.html" }, { "name": "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/" }, { "name": "FEDORA-2015-323274d412", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html" }, { "name": "1034237", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034237" }, { "name": "RHSA-2016:0158", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0158.html" }, { "name": "RHSA-2016:0157", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0157.html" }, { "name": "DSA-3404", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3404" }, { "name": "RHSA-2016:0156", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0156.html" }, { "name": "77750", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77750" }, { "name": "FEDORA-2015-a8c8f60fbd", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html" }, { "name": "openSUSE-SU-2015:2202", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8213", "datePublished": "2015-12-07T20:00:00", "dateReserved": "2015-11-14T00:00:00", "dateUpdated": "2024-08-06T08:13:31.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3082
Vulnerability from cvelistv5
Published
2010-09-14 18:00
Modified
2024-08-07 02:55
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1004-1 | vendor-advisory, x_refsource_UBUNTU | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/61729 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/43116 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=oss-security&m=128403961700444&w=2 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=632239 | x_refsource_CONFIRM | |
http://www.djangoproject.com/weblog/2010/sep/08/security-release/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1004-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1004-1" }, { "name": "django-token-csrf(61729)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729" }, { "name": "43116", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43116" }, { "name": "[oss-security] 20100909 CVE Assignment: django", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=128403961700444\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632239" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.djangoproject.com/weblog/2010/sep/08/security-release/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-1004-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1004-1" }, { "name": "django-token-csrf(61729)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729" }, { "name": "43116", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43116" }, { "name": "[oss-security] 20100909 CVE Assignment: django", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=128403961700444\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632239" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.djangoproject.com/weblog/2010/sep/08/security-release/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3082", "datePublished": "2010-09-14T18:00:00", "dateReserved": "2010-08-20T00:00:00", "dateUpdated": "2024-08-07T02:55:46.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3443
Vulnerability from cvelistv5
Published
2012-07-31 17:00
Modified
2024-08-06 20:05
Severity ?
EPSS score ?
Summary
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/07/31/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.ubuntu.com/usn/USN-1560-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.openwall.com/lists/oss-security/2012/07/31/2 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2012/dsa-2529 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "name": "MDVSA-2012:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "name": "USN-1560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "name": "DSA-2529", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2529" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-29T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "name": "MDVSA-2012:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "name": "USN-1560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "name": "DSA-2529", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2529" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3443", "datePublished": "2012-07-31T17:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6044
Vulnerability from cvelistv5
Published
2013-10-04 17:00
Modified
2024-08-06 17:29
Severity ?
EPSS score ?
Summary
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:29:43.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "61777", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61777" }, { "name": "1028915", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1028915" }, { "name": "openSUSE-SU-2013:1541", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a" }, { "name": "54476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54476" }, { "name": "RHSA-2013:1521", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "name": "[oss-security] 20130814 [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "name": "django-issafeurl-xss(86437)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f" }, { "name": "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/411" }, { "name": "DSA-2740", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2740" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL\u0027s scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by \"the login view in django.contrib.auth.views\" and the javascript: scheme." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "61777", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61777" }, { "name": "1028915", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1028915" }, { "name": "openSUSE-SU-2013:1541", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a" }, { "name": "54476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54476" }, { "name": "RHSA-2013:1521", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "name": "[oss-security] 20130814 [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "name": "django-issafeurl-xss(86437)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f" }, { "name": "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/411" }, { "name": "DSA-2740", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2740" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-6044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL\u0027s scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by \"the login view in django.contrib.auth.views\" and the javascript: scheme." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "61777", "refsource": "BID", "url": "http://www.securityfocus.com/bid/61777" }, { "name": "1028915", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1028915" }, { "name": "openSUSE-SU-2013:1541", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "name": "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a" }, { "name": "54476", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54476" }, { "name": "RHSA-2013:1521", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "name": "[oss-security] 20130814 [CVE request] Django 1.4.6 security release", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "name": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "name": "django-issafeurl-xss(86437)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437" }, { "name": "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762" }, { "name": "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f" }, { "name": "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/411" }, { "name": "DSA-2740", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2740" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-6044", "datePublished": "2013-10-04T17:00:00", "dateReserved": "2013-10-04T00:00:00", "dateUpdated": "2024-08-06T17:29:43.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36359
Vulnerability from cvelistv5
Published
2022-08-03 00:00
Modified
2024-08-03 10:00
Severity ?
EPSS score ?
Summary
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "name": "[oss-security] 20220803 Django: CVE-2022-36359: Potential reflected file download vulnerability in FileResponse.", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/03/1" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/django-announce/c/8cz--gvaJr4" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220915-0008/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-28T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "name": "[oss-security] 20220803 Django: CVE-2022-36359: Potential reflected file download vulnerability in FileResponse.", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/03/1" }, { "url": "https://groups.google.com/g/django-announce/c/8cz--gvaJr4" }, { "url": "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/" }, { "url": "https://security.netapp.com/advisory/ntap-20220915-0008/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36359", "datePublished": "2022-08-03T00:00:00", "dateReserved": "2022-07-21T00:00:00", "dateUpdated": "2024-08-03T10:00:04.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45230
Vulnerability from cvelistv5
Published
2024-10-08 00:00
Modified
2024-10-30 16:33
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "lessThan": "5.1.1", "status": "affected", "version": "5.1", "versionType": "custom" }, { "lessThan": "5.0.9", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThan": "4.2.16", "status": "affected", "version": "4.2", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45230", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-30T16:30:05.616132Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T16:33:50.329Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T15:05:33.553930", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-45230", "datePublished": "2024-10-08T00:00:00", "dateReserved": "2024-08-24T00:00:00", "dateUpdated": "2024-10-30T16:33:50.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4315
Vulnerability from cvelistv5
Published
2013-09-16 19:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://secunia.com/advisories/54772 | third-party-advisory, x_refsource_SECUNIA | |
http://rhn.redhat.com/errata/RHSA-2013-1521.html | vendor-advisory, x_refsource_REDHAT | |
https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/ | x_refsource_CONFIRM | |
http://secunia.com/advisories/54828 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2013/dsa-2755 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:1541", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "name": "54772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54772" }, { "name": "RHSA-2013:1521", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/" }, { "name": "54828", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54828" }, { "name": "DSA-2755", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2755" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-09T05:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2013:1541", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "name": "54772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54772" }, { "name": "RHSA-2013:1521", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/" }, { "name": "54828", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54828" }, { "name": "DSA-2755", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2755" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:1541", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "name": "54772", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54772" }, { "name": "RHSA-2013:1521", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "name": "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/" }, { "name": "54828", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54828" }, { "name": "DSA-2755", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2755" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4315", "datePublished": "2013-09-16T19:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5145
Vulnerability from cvelistv5
Published
2015-07-14 17:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-06 | vendor-advisory, x_refsource_GENTOO | |
https://www.djangoproject.com/weblog/2015/jul/08/security-releases/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/75691 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1032820 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-06" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "75691", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75691" }, { "name": "1032820", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032820" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-21T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-06" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "75691", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75691" }, { "name": "1032820", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032820" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5145", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-06" }, { "name": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "75691", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75691" }, { "name": "1032820", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032820" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5145", "datePublished": "2015-07-14T17:00:00", "dateReserved": "2015-06-29T00:00:00", "dateUpdated": "2024-08-06T06:32:32.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31542
Vulnerability from cvelistv5
Published
2021-05-05 00:00
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/04/3" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/may/04/security-releases/" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html" }, { "name": "FEDORA-2021-01044b8a59", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210618-0001/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-07T21:59:18.604732", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "url": "http://www.openwall.com/lists/oss-security/2021/05/04/3" }, { "url": "https://www.djangoproject.com/weblog/2021/may/04/security-releases/" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html" }, { "name": "FEDORA-2021-01044b8a59", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "url": "https://security.netapp.com/advisory/ntap-20210618-0001/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "url": "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d" }, { "url": "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48" }, { "url": "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31542", "datePublished": "2021-05-05T00:00:00", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7233
Vulnerability from cvelistv5
Published
2017-04-04 17:00
Modified
2024-08-05 15:56
Severity ?
EPSS score ?
Summary
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038177 | vdb-entry, x_refsource_SECTRACK | |
https://access.redhat.com/errata/RHSA-2017:1596 | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/97406 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2017:3093 | vendor-advisory, x_refsource_REDHAT | |
http://www.debian.org/security/2017/dsa-3835 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2017:1445 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2017:1451 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2018:2927 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2017:1470 | vendor-advisory, x_refsource_REDHAT | |
https://www.djangoproject.com/weblog/2017/apr/04/security-releases/ | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2017:1462 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038177", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038177" }, { "name": "RHSA-2017:1596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1596" }, { "name": "97406", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97406" }, { "name": "RHSA-2017:3093", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3093" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "RHSA-2017:1445", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1445" }, { "name": "RHSA-2017:1451", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1451" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "RHSA-2017:1470", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1470" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" }, { "name": "RHSA-2017:1462", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1462" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn\u0027t be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1038177", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038177" }, { "name": "RHSA-2017:1596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1596" }, { "name": "97406", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97406" }, { "name": "RHSA-2017:3093", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3093" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "RHSA-2017:1445", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1445" }, { "name": "RHSA-2017:1451", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1451" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "RHSA-2017:1470", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1470" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" }, { "name": "RHSA-2017:1462", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1462" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn\u0027t be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038177", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038177" }, { "name": "RHSA-2017:1596", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1596" }, { "name": "97406", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97406" }, { "name": "RHSA-2017:3093", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3093" }, { "name": "DSA-3835", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "RHSA-2017:1445", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1445" }, { "name": "RHSA-2017:1451", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1451" }, { "name": "RHSA-2018:2927", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "RHSA-2017:1470", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1470" }, { "name": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" }, { "name": "RHSA-2017:1462", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1462" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7233", "datePublished": "2017-04-04T17:00:00", "dateReserved": "2017-03-22T00:00:00", "dateUpdated": "2024-08-05T15:56:36.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0474
Vulnerability from cvelistv5
Published
2014-04-23 14:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to "MySQL typecasting."
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-2169-1 | vendor-advisory, x_refsource_UBUNTU | |
https://www.djangoproject.com/weblog/2014/apr/21/security/ | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2014-0457.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2014/dsa-2934 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2014-0456.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:18.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2169-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to \"MySQL typecasting.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "USN-2169-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-0474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to \"MySQL typecasting.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2169-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "name": "https://www.djangoproject.com/weblog/2014/apr/21/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-0474", "datePublished": "2014-04-23T14:00:00", "dateReserved": "2013-12-19T00:00:00", "dateUpdated": "2024-08-06T09:20:18.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14232
Vulnerability from cvelistv5
Published
2019-08-02 00:00
Modified
2024-08-05 00:12
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:djangoblog_project:djangoblog:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "djangoblog", "vendor": "djangoblog_project", "versions": [ { "lessThan": "2.2.4", "status": "affected", "version": "1.11.23", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-14232", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-02T18:04:48.307144Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:12:01.500Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:42.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "[oss-security] 20231004 Django: CVE-2023-43665: Denial-of-service possibility in django.utils.text.Truncator", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/6" }, { "name": "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator\u0027s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T17:09:49.299848", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "[oss-security] 20231004 Django: CVE-2023-43665: Denial-of-service possibility in django.utils.text.Truncator", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/6" }, { "name": "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14232", "datePublished": "2019-08-02T00:00:00", "dateReserved": "2019-07-22T00:00:00", "dateUpdated": "2024-08-05T00:12:42.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0220
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "MDVSA-2015:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \"\\njavascript:\" URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "62718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "MDVSA-2015:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "62285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \"\\njavascript:\" URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62718", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62718" }, { "name": "FEDORA-2015-0804", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "name": "USN-2469-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2469-1" }, { "name": "MDVSA-2015:036", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "name": "62285", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62285" }, { "name": "openSUSE-SU-2015:1598", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "https://www.djangoproject.com/weblog/2015/jan/13/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "name": "openSUSE-SU-2015:0643", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "62309", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62309" }, { "name": "MDVSA-2015:109", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "name": "http://advisories.mageia.org/MGASA-2015-0026.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "name": "FEDORA-2015-0714", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0220", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45452
Vulnerability from cvelistv5
Published
2022-01-04 23:09
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/4.0/releases/security/ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220121-0005/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:21.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-11T02:06:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/4.0/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "name": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20220121-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45452", "datePublished": "2022-01-04T23:09:40", "dateReserved": "2021-12-21T00:00:00", "dateUpdated": "2024-08-04T04:39:21.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3442
Vulnerability from cvelistv5
Published
2012-07-31 17:00
Modified
2024-08-06 20:05
Severity ?
EPSS score ?
Summary
The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/07/31/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.ubuntu.com/usn/USN-1560-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.openwall.com/lists/oss-security/2012/07/31/2 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2012/dsa-2529 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "name": "MDVSA-2012:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "name": "USN-1560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "name": "DSA-2529", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2529" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-29T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "name": "MDVSA-2012:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "name": "USN-1560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "name": "DSA-2529", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2529" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3442", "datePublished": "2012-07-31T17:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24680
Vulnerability from cvelistv5
Published
2024-02-06 00:00
Modified
2024-08-01 23:28
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/5.0/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/" }, { "name": "FEDORA-2024-5c7fb64c74", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/" }, { "name": "FEDORA-2024-2ec03ca8cb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-20T03:05:55.273636", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/5.0/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/" }, { "name": "FEDORA-2024-5c7fb64c74", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/" }, { "name": "FEDORA-2024-2ec03ca8cb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-24680", "datePublished": "2024-02-06T00:00:00", "dateReserved": "2024-01-26T00:00:00", "dateUpdated": "2024-08-01T23:28:11.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45116
Vulnerability from cvelistv5
Published
2022-01-04 23:12
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/4.0/releases/security/ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220121-0005/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language\u0027s variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-11T02:06:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language\u0027s variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/4.0/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "name": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20220121-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45116", "datePublished": "2022-01-04T23:12:43", "dateReserved": "2021-12-16T00:00:00", "dateUpdated": "2024-08-04T04:39:20.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-24580
Vulnerability from cvelistv5
Published
2023-02-15 00:00
Modified
2024-08-02 11:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:03:18.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/02/14/1" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/" }, { "name": "[debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html" }, { "name": "FEDORA-2023-3d775d93be", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "name": "FEDORA-2023-bde7913e5a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "name": "FEDORA-2023-a74513bda8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230316-0006/" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-28T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "url": "http://www.openwall.com/lists/oss-security/2023/02/14/1" }, { "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/" }, { "name": "[debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html" }, { "name": "FEDORA-2023-3d775d93be", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "name": "FEDORA-2023-bde7913e5a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "name": "FEDORA-2023-a74513bda8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "url": "https://security.netapp.com/advisory/ntap-20230316-0006/" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-24580", "datePublished": "2023-02-15T00:00:00", "dateReserved": "2023-01-27T00:00:00", "dateUpdated": "2024-08-02T11:03:18.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5963
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 07:06
Severity ?
EPSS score ?
Summary
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:06:34.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "openSUSE-SU-2015:1580", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html" }, { "name": "RHSA-2015:1894", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "name": "DSA-3338", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3338" }, { "name": "1033318", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033318" }, { "name": "RHSA-2015:1767", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "USN-2720-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "name": "RHSA-2015:1766", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "name": "RHSA-2015:1876", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2015:1876" }, { "name": "76428", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76428" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-02T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "openSUSE-SU-2015:1580", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html" }, { "name": "RHSA-2015:1894", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "name": "DSA-3338", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3338" }, { "name": "1033318", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033318" }, { "name": "RHSA-2015:1767", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "name": "openSUSE-SU-2015:1598", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "USN-2720-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "name": "RHSA-2015:1766", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "name": "RHSA-2015:1876", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2015:1876" }, { "name": "76428", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76428" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5963", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-1dd5bc998f", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "openSUSE-SU-2015:1580", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html" }, { "name": "RHSA-2015:1894", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "name": "DSA-3338", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3338" }, { "name": "1033318", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033318" }, { "name": "RHSA-2015:1767", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "name": "openSUSE-SU-2015:1598", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "name": "USN-2720-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "name": "RHSA-2015:1766", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "name": "RHSA-2015:1876", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2015:1876" }, { "name": "76428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76428" }, { "name": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/", "refsource": "MISC", "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5963", "datePublished": "2015-08-24T14:00:00", "dateReserved": "2015-08-07T00:00:00", "dateUpdated": "2024-08-06T07:06:34.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33571
Vulnerability from cvelistv5
Published
2021-06-08 00:00
Modified
2024-08-03 23:50
Severity ?
EPSS score ?
Summary
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e" }, { "tags": [ "x_transferred" ], "url": "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) ." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-07T22:09:18.547259", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "url": "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo" }, { "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" }, { "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "url": "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc" }, { "url": "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e" }, { "url": "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33571", "datePublished": "2021-06-08T00:00:00", "dateReserved": "2021-05-25T00:00:00", "dateUpdated": "2024-08-03T23:50:43.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24583
Vulnerability from cvelistv5
Published
2020-09-01 12:33
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:08.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-4479-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "name": "FEDORA-2020-94407454d7", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "name": "FEDORA-2020-6941c0a65b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "name": "FEDORA-2020-9c6b391162", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-20T14:42:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-4479-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "name": "FEDORA-2020-94407454d7", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "name": "FEDORA-2020-6941c0a65b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "name": "FEDORA-2020-9c6b391162", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-4479-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4479-1/" }, { "name": "FEDORA-2020-94407454d7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "name": "FEDORA-2020-6941c0a65b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "name": "FEDORA-2020-9c6b391162", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM" }, { "name": "https://www.openwall.com/lists/oss-security/2020/09/01/2", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "name": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/", "refsource": "MISC", "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20200918-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24583", "datePublished": "2020-09-01T12:33:13", "dateReserved": "2020-08-21T00:00:00", "dateUpdated": "2024-08-04T15:19:08.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-23336
Vulnerability from cvelistv5
Published
2021-02-15 12:15
Modified
2024-09-16 18:55
Severity ?
EPSS score ?
Summary
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | python/cpython |
Version: 0 < unspecified Version: unspecified < 3.6.13 Version: 3.7.0 < unspecified Version: unspecified < 3.7.10 Version: 3.8.0 < unspecified Version: unspecified < 3.8.8 Version: 3.9.0 < unspecified Version: unspecified < 3.9.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:05:55.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933" }, { "tags": [ "x_transferred" ], "url": "https://github.com/python/cpython/pull/24297" }, { "tags": [ "x_transferred" ], "url": "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/" }, { "name": "[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/19/4" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2569-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html" }, { "name": "FEDORA-2021-7547ad987f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/" }, { "name": "FEDORA-2021-f4fd9372c7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/" }, { "name": "FEDORA-2021-3352c1c802", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/" }, { "name": "FEDORA-2021-7d3a9004e2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/" }, { "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "name": "FEDORA-2021-907f3bacae", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/" }, { "name": "FEDORA-2021-7c1bb32d13", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/" }, { "name": "FEDORA-2021-b1843407ca", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/" }, { "name": "FEDORA-2021-2897f5366c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/" }, { "name": "FEDORA-2021-b326fcb83f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/" }, { "name": "FEDORA-2021-1bb399a5af", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/" }, { "name": "FEDORA-2021-ef83e8525a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/" }, { "name": "FEDORA-2021-b76ede8f4d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/" }, { "name": "FEDORA-2021-309bc2e727", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/" }, { "name": "FEDORA-2021-5a09621ebb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/" }, { "name": "FEDORA-2021-e22bb0e548", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/" }, { "name": "FEDORA-2021-e525e48886", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html" }, { "name": "[debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html" }, { "name": "FEDORA-2021-b6b6093b3a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/" }, { "name": "GLSA-202104-04", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-04" }, { "name": "[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E" }, { "name": "[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/01/2" }, { "name": "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E" }, { "name": "FEDORA-2021-98720f3785", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/" }, { "name": "FEDORA-2021-12df7f7382", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210326-0004/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "[debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "python/cpython", "vendor": "n/a", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "3.6.13", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.7.0", "versionType": "custom" }, { "lessThan": "3.7.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.8.0", "versionType": "custom" }, { "lessThan": "3.8.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.9.0", "versionType": "custom" }, { "lessThan": "3.9.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Snyk Security Team" } ], "datePublic": "2021-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitCodeMaturity": "PROOF_OF_CONCEPT", "integrityImpact": "LOW", "privilegesRequired": "NONE", "remediationLevel": "UNAVAILABLE", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.6, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Web Cache Poisoning", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-20T21:06:13.958312", "orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "shortName": "snyk" }, "references": [ { "url": "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933" }, { "url": "https://github.com/python/cpython/pull/24297" }, { "url": "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/" }, { "name": "[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/19/4" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2569-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html" }, { "name": "FEDORA-2021-7547ad987f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/" }, { "name": "FEDORA-2021-f4fd9372c7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/" }, { "name": "FEDORA-2021-3352c1c802", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/" }, { "name": "FEDORA-2021-7d3a9004e2", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/" }, { "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "name": "FEDORA-2021-907f3bacae", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/" }, { "name": "FEDORA-2021-7c1bb32d13", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/" }, { "name": "FEDORA-2021-b1843407ca", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/" }, { "name": "FEDORA-2021-2897f5366c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/" }, { "name": "FEDORA-2021-b326fcb83f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/" }, { "name": "FEDORA-2021-1bb399a5af", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/" }, { "name": "FEDORA-2021-ef83e8525a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/" }, { "name": "FEDORA-2021-b76ede8f4d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/" }, { "name": "FEDORA-2021-309bc2e727", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/" }, { "name": "FEDORA-2021-5a09621ebb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/" }, { "name": "FEDORA-2021-e22bb0e548", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/" }, { "name": "FEDORA-2021-e525e48886", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html" }, { "name": "[debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html" }, { "name": "FEDORA-2021-b6b6093b3a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/" }, { "name": "GLSA-202104-04", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202104-04" }, { "name": "[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E" }, { "name": "[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/01/2" }, { "name": "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E" }, { "name": "FEDORA-2021-98720f3785", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/" }, { "name": "FEDORA-2021-12df7f7382", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/" }, { "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "url": "https://security.netapp.com/advisory/ntap-20210326-0004/" }, { "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "[debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html" } ], "title": "Web Cache Poisoning" } }, "cveMetadata": { "assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "assignerShortName": "snyk", "cveId": "CVE-2021-23336", "datePublished": "2021-02-15T12:15:20.788790Z", "dateReserved": "2021-01-08T00:00:00", "dateUpdated": "2024-09-16T18:55:19.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23969
Vulnerability from cvelistv5
Published
2023-02-01 00:00
Modified
2024-08-02 10:49
Severity ?
EPSS score ?
Summary
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:49:08.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/" }, { "name": "[debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230302-0007/" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-28T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/" }, { "name": "[debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230302-0007/" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-23969", "datePublished": "2023-02-01T00:00:00", "dateReserved": "2023-01-20T00:00:00", "dateUpdated": "2024-08-02T10:49:08.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1443
Vulnerability from cvelistv5
Published
2013-09-23 20:00
Modified
2024-08-06 15:04
Severity ?
EPSS score ?
Summary
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2013/dsa-2758 | vendor-advisory, x_refsource_DEBIAN | |
http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html | vendor-advisory, x_refsource_SUSE | |
https://www.djangoproject.com/weblog/2013/sep/15/security/ | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:04:48.781Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-2758", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2758" }, { "name": "[django-developers] 20130914 Set a reasonable upper bound on password length", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html" }, { "name": "openSUSE-SU-2013:1541", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2013/sep/15/security/" }, { "name": "openSUSE-SU-2013:1685", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-23T14:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "DSA-2758", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2758" }, { "name": "[django-developers] 20130914 Set a reasonable upper bound on password length", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html" }, { "name": "openSUSE-SU-2013:1541", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2013/sep/15/security/" }, { "name": "openSUSE-SU-2013:1685", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2013-1443", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-2758", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2758" }, { "name": "[django-developers] 20130914 Set a reasonable upper bound on password length", "refsource": "MLIST", "url": "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html" }, { "name": "openSUSE-SU-2013:1541", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "name": "https://www.djangoproject.com/weblog/2013/sep/15/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2013/sep/15/security/" }, { "name": "openSUSE-SU-2013:1685", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2013-1443", "datePublished": "2013-09-23T20:00:00", "dateReserved": "2013-01-26T00:00:00", "dateUpdated": "2024-08-06T15:04:48.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5144
Vulnerability from cvelistv5
Published
2015-07-14 17:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/201510-06 | vendor-advisory, x_refsource_GENTOO | |
https://www.djangoproject.com/weblog/2015/jul/08/security-releases/ | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2015/dsa-3305 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/75665 | vdb-entry, x_refsource_BID | |
http://www.ubuntu.com/usn/USN-2671-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securitytracker.com/id/1032820 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "GLSA-201510-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-06" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "openSUSE-SU-2015:1802", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "name": "openSUSE-SU-2015:1813", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "name": "DSA-3305", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "name": "75665", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75665" }, { "name": "USN-2671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "name": "1032820", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032820" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-21T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "GLSA-201510-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-06" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "openSUSE-SU-2015:1802", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "name": "openSUSE-SU-2015:1813", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "name": "DSA-3305", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "name": "75665", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75665" }, { "name": "USN-2671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "name": "1032820", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032820" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-1dd5bc998f", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "GLSA-201510-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-06" }, { "name": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "openSUSE-SU-2015:1802", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "name": "openSUSE-SU-2015:1813", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "name": "DSA-3305", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3305" }, { "name": "75665", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75665" }, { "name": "USN-2671-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "name": "1032820", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032820" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5144", "datePublished": "2015-07-14T17:00:00", "dateReserved": "2015-06-29T00:00:00", "dateUpdated": "2024-08-06T06:32:32.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45115
Vulnerability from cvelistv5
Published
2022-01-04 23:16
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21forum/django-announce | x_refsource_MISC | |
https://docs.djangoproject.com/en/4.0/releases/security/ | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220121-0005/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-11T02:06:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!forum/django-announce", "refsource": "MISC", "url": "https://groups.google.com/forum/#!forum/django-announce" }, { "name": "https://docs.djangoproject.com/en/4.0/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "name": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20220121-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "name": "FEDORA-2022-e7fd530688", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45115", "datePublished": "2022-01-04T23:16:00", "dateReserved": "2021-12-16T00:00:00", "dateUpdated": "2024-08-04T04:39:20.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2316
Vulnerability from cvelistv5
Published
2015-03-25 14:00
Modified
2024-08-06 05:10
Severity ?
EPSS score ?
Summary
The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-2539-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/73322 | vdb-entry, x_refsource_BID | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html | vendor-advisory, x_refsource_FEDORA | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html | vendor-advisory, x_refsource_SUSE | |
https://www.djangoproject.com/weblog/2015/mar/18/security-releases/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:16.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2539-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2539-1" }, { "name": "73322", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73322" }, { "name": "FEDORA-2015-5766", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-2539-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2539-1" }, { "name": "73322", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73322" }, { "name": "FEDORA-2015-5766", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "openSUSE-SU-2015:0643", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2539-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2539-1" }, { "name": "73322", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73322" }, { "name": "FEDORA-2015-5766", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "openSUSE-SU-2015:0643", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "name": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2316", "datePublished": "2015-03-25T14:00:00", "dateReserved": "2015-03-17T00:00:00", "dateUpdated": "2024-08-06T05:10:16.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12308
Vulnerability from cvelistv5
Published
2019-06-03 16:24
Modified
2024-08-04 23:17
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:39.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "[oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/03/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/1.11.21/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.1.9/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.2.2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/" }, { "name": "108559", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108559" }, { "name": "[debian-lts-announce] 20190605 [SECURITY] [DLA 1814-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html" }, { "name": "FEDORA-2019-57a4324120", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/" }, { "name": "USN-4043-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4043-1/" }, { "name": "[debian-lts-announce] 20190701 [SECURITY] [DLA 1842-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html" }, { "name": "DSA-4476", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-01T01:06:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "[oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/03/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.djangoproject.com/en/dev/releases/1.11.21/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.1.9/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.2.2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/" }, { "name": "108559", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108559" }, { "name": "[debian-lts-announce] 20190605 [SECURITY] [DLA 1814-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html" }, { "name": "FEDORA-2019-57a4324120", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/" }, { "name": "USN-4043-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4043-1/" }, { "name": "[debian-lts-announce] 20190701 [SECURITY] [DLA 1842-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html" }, { "name": "DSA-4476", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "[oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/03/2" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/GEbHU7YoVz8", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/GEbHU7YoVz8" }, { "name": "https://docs.djangoproject.com/en/dev/releases/1.11.21/", "refsource": "CONFIRM", "url": "https://docs.djangoproject.com/en/dev/releases/1.11.21/" }, { "name": "https://docs.djangoproject.com/en/dev/releases/2.1.9/", "refsource": "CONFIRM", "url": "https://docs.djangoproject.com/en/dev/releases/2.1.9/" }, { "name": "https://docs.djangoproject.com/en/dev/releases/2.2.2/", "refsource": "CONFIRM", "url": "https://docs.djangoproject.com/en/dev/releases/2.2.2/" }, { "name": "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/" }, { "name": "108559", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108559" }, { "name": "[debian-lts-announce] 20190605 [SECURITY] [DLA 1814-1] python-django security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html" }, { "name": "FEDORA-2019-57a4324120", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/" }, { "name": "USN-4043-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4043-1/" }, { "name": "[debian-lts-announce] 20190701 [SECURITY] [DLA 1842-1] python-django security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html" }, { "name": "DSA-4476", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "name": "openSUSE-SU-2019:1839", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "openSUSE-SU-2019:1872", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12308", "datePublished": "2019-06-03T16:24:31", "dateReserved": "2019-05-23T00:00:00", "dateUpdated": "2024-08-04T23:17:39.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4140
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
EPSS score ?
Summary
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
References
▼ | URL | Tags |
---|---|---|
https://hermes.opensuse.org/messages/14700881 | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2011/dsa-2332 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.redhat.com/show_bug.cgi?id=737366 | x_refsource_CONFIRM | |
http://secunia.com/advisories/46614 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2011/09/11/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/10/127/ | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/09/13/2 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/09/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:51.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2012:0653", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737366", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/10/127/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/09/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4140", "datePublished": "2011-10-19T10:00:00", "dateReserved": "2011-10-19T00:00:00", "dateUpdated": "2024-08-07T00:01:51.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0306
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 14:25
Severity ?
EPSS score ?
Summary
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2013/feb/19/security/ | x_refsource_CONFIRM | |
http://ubuntu.com/usn/usn-1757-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2013/dsa-2634 | vendor-advisory, x_refsource_DEBIAN | |
http://rhn.redhat.com/errata/RHSA-2013-0670.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:25:08.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" }, { "name": "USN-1757-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-1757-1" }, { "name": "DSA-2634", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2634" }, { "name": "RHSA-2013:0670", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-15T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" }, { "name": "USN-1757-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-1757-1" }, { "name": "DSA-2634", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2634" }, { "name": "RHSA-2013:0670", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0306", "datePublished": "2013-05-02T14:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:25:08.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0481
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2014/aug/20/security/ | x_refsource_CONFIRM | |
http://secunia.com/advisories/61276 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2014/dsa-3010 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/59782 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:18.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59782" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59782" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-0481", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2014/aug/20/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "59782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59782" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-0481", "datePublished": "2014-08-26T14:00:00", "dateReserved": "2013-12-19T00:00:00", "dateUpdated": "2024-08-06T09:20:18.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4139
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
EPSS score ?
Summary
Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.
References
▼ | URL | Tags |
---|---|---|
https://hermes.opensuse.org/messages/14700881 | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2011/dsa-2332 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.redhat.com/show_bug.cgi?id=737366 | x_refsource_CONFIRM | |
http://secunia.com/advisories/46614 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2011/09/11/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/10/127/ | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/09/13/2 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2011/sep/09/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:50.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Django before 1.2.7 and 1.3.x before 1.3.1 uses a request\u0027s HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openSUSE-SU-2012:0653", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2332" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django before 1.2.7 and 1.3.x before 1.3.1 uses a request\u0027s HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2012:0653", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/14700881" }, { "name": "DSA-2332", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737366", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "name": "46614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46614" }, { "name": "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/10/127/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "name": "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "name": "https://www.djangoproject.com/weblog/2011/sep/09/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2011/sep/09/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4139", "datePublished": "2011-10-19T10:00:00", "dateReserved": "2011-10-19T00:00:00", "dateUpdated": "2024-08-07T00:01:50.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28658
Vulnerability from cvelistv5
Published
2021-04-06 14:51
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://docs.djangoproject.com/en/3.1/releases/security/ | x_refsource_MISC | |
https://groups.google.com/g/django-announce/c/ePr5j-ngdPU | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2021/apr/06/security-releases/ | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html | mailing-list, x_refsource_MLIST | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/ | vendor-advisory, x_refsource_FEDORA | |
https://security.netapp.com/advisory/ntap-20210528-0001/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:33.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/" }, { "name": "[debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html" }, { "name": "FEDORA-2021-01044b8a59", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210528-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-28T09:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/" }, { "name": "[debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html" }, { "name": "FEDORA-2021-01044b8a59", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210528-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-28658", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/3.1/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "name": "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU", "refsource": "MISC", "url": "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU" }, { "name": "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/" }, { "name": "[debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html" }, { "name": "FEDORA-2021-01044b8a59", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "name": "https://security.netapp.com/advisory/ntap-20210528-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210528-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-28658", "datePublished": "2021-04-06T14:51:43", "dateReserved": "2021-03-17T00:00:00", "dateUpdated": "2024-08-03T21:47:33.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0483
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2014/aug/20/security/ | x_refsource_CONFIRM | |
http://secunia.com/advisories/61276 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2014/dsa-3010 | vendor-advisory, x_refsource_DEBIAN | |
https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6 | x_refsource_CONFIRM | |
http://secunia.com/advisories/59782 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:18.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59782" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1\u0026t=password URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6" }, { "name": "59782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59782" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-0483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1\u0026t=password URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2014/aug/20/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "name": "61276", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61276" }, { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "DSA-3010", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "name": "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6" }, { "name": "59782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59782" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-0483", "datePublished": "2014-08-26T14:00:00", "dateReserved": "2013-12-19T00:00:00", "dateUpdated": "2024-08-06T09:20:18.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28347
Vulnerability from cvelistv5
Published
2022-04-12 00:00
Modified
2024-08-03 05:56
Severity ?
EPSS score ?
Summary
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:56:14.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-28T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" }, { "name": "DSA-5254", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "name": "FEDORA-2023-8fed428c5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "name": "FEDORA-2023-a53ab7c969", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28347", "datePublished": "2022-04-12T00:00:00", "dateReserved": "2022-04-02T00:00:00", "dateUpdated": "2024-08-03T05:56:14.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12781
Vulnerability from cvelistv5
Published
2019-07-01 13:56
Modified
2024-08-04 23:32
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:54.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/" }, { "name": "[oss-security] 20190701 Django: CVE-2019-12781: Incorrect HTTP detection with reverse-proxy connecting via HTTPS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/01/3" }, { "name": "USN-4043-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4043-1/" }, { "name": "109018", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109018" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190705-0002/" }, { "name": "DSA-4476", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "name": "FEDORA-2019-d9aa58d863", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-14T14:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/" }, { "name": "[oss-security] 20190701 Django: CVE-2019-12781: Incorrect HTTP detection with reverse-proxy connecting via HTTPS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/01/3" }, { "name": "USN-4043-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4043-1/" }, { "name": "109018", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109018" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190705-0002/" }, { "name": "DSA-4476", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "name": "FEDORA-2019-d9aa58d863", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12781", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ" }, { "name": "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/" }, { "name": "[oss-security] 20190701 Django: CVE-2019-12781: Incorrect HTTP detection with reverse-proxy connecting via HTTPS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/07/01/3" }, { "name": "USN-4043-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4043-1/" }, { "name": "109018", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109018" }, { "name": "https://security.netapp.com/advisory/ntap-20190705-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190705-0002/" }, { "name": "DSA-4476", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4476" }, { "name": "20190708 [SECURITY] [DSA 4476-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "name": "FEDORA-2019-d9aa58d863", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/" }, { "name": "openSUSE-SU-2019:1839", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "openSUSE-SU-2019:1872", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12781", "datePublished": "2019-07-01T13:56:37", "dateReserved": "2019-06-10T00:00:00", "dateUpdated": "2024-08-04T23:32:54.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6186
Vulnerability from cvelistv5
Published
2016-08-05 15:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036338", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036338" }, { "name": "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/53" }, { "name": "RHSA-2016:1594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1594.html" }, { "name": "DSA-3622", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3622" }, { "name": "FEDORA-2016-97ca9d52a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.vulnerability-lab.com/get_content.php?id=1869" }, { "name": "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538947/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html" }, { "name": "USN-3039-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3039-1" }, { "name": "FEDORA-2016-b7e31a0b9a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d" }, { "name": "RHSA-2016:1596", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1596.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158" }, { "name": "92058", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92058" }, { "name": "RHSA-2016:1595", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1595.html" }, { "name": "40129", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40129/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1036338", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036338" }, { "name": "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/53" }, { "name": "RHSA-2016:1594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1594.html" }, { "name": "DSA-3622", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3622" }, { "name": "FEDORA-2016-97ca9d52a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.vulnerability-lab.com/get_content.php?id=1869" }, { "name": "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538947/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html" }, { "name": "USN-3039-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3039-1" }, { "name": "FEDORA-2016-b7e31a0b9a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d" }, { "name": "RHSA-2016:1596", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1596.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158" }, { "name": "92058", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92058" }, { "name": "RHSA-2016:1595", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1595.html" }, { "name": "40129", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40129/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036338", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036338" }, { "name": "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Jul/53" }, { "name": "RHSA-2016:1594", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1594.html" }, { "name": "DSA-3622", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3622" }, { "name": "FEDORA-2016-97ca9d52a4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/" }, { "name": "http://www.vulnerability-lab.com/get_content.php?id=1869", "refsource": "MISC", "url": "http://www.vulnerability-lab.com/get_content.php?id=1869" }, { "name": "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538947/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html" }, { "name": "USN-3039-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3039-1" }, { "name": "FEDORA-2016-b7e31a0b9a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/" }, { "name": "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d" }, { "name": "RHSA-2016:1596", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1596.html" }, { "name": "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/" }, { "name": "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158" }, { "name": "92058", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92058" }, { "name": "RHSA-2016:1595", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1595.html" }, { "name": "40129", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40129/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6186", "datePublished": "2016-08-05T15:00:00", "dateReserved": "2016-07-08T00:00:00", "dateUpdated": "2024-08-06T01:22:20.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0473
Vulnerability from cvelistv5
Published
2014-04-23 14:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-2169-1 | vendor-advisory, x_refsource_UBUNTU | |
https://www.djangoproject.com/weblog/2014/apr/21/security/ | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2014-0457.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/61281 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2014/dsa-2934 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2014-0456.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:18.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2169-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "USN-2169-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-0473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2169-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "name": "https://www.djangoproject.com/weblog/2014/apr/21/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "name": "RHSA-2014:0457", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "name": "61281", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61281" }, { "name": "DSA-2934", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "name": "openSUSE-SU-2014:1132", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "name": "RHSA-2014:0456", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-0473", "datePublished": "2014-04-23T14:00:00", "dateReserved": "2013-12-19T00:00:00", "dateUpdated": "2024-08-06T09:20:18.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-9013
Vulnerability from cvelistv5
Published
2016-12-09 20:00
Modified
2024-08-06 02:35
Severity ?
EPSS score ?
Summary
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2016/nov/01/security-releases/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/ | vendor-advisory, x_refsource_FEDORA | |
http://www.debian.org/security/2017/dsa-3835 | vendor-advisory, x_refsource_DEBIAN | |
http://www.ubuntu.com/usn/USN-3115-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/94069 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037159 | vdb-entry, x_refsource_SECTRACK | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:35:02.828Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "name": "FEDORA-2016-d4571bf555", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "USN-3115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "name": "94069", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94069" }, { "name": "1037159", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037159" }, { "name": "FEDORA-2016-3eb5a55123", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "name": "FEDORA-2016-d4571bf555", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "USN-3115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "name": "94069", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94069" }, { "name": "1037159", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037159" }, { "name": "FEDORA-2016-3eb5a55123", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-9013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "name": "FEDORA-2016-d4571bf555", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "name": "DSA-3835", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "USN-3115-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "name": "94069", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94069" }, { "name": "1037159", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037159" }, { "name": "FEDORA-2016-3eb5a55123", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-9013", "datePublished": "2016-12-09T20:00:00", "dateReserved": "2016-10-25T00:00:00", "dateUpdated": "2024-08-06T02:35:02.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-7471
Vulnerability from cvelistv5
Published
2020-02-03 11:59
Modified
2024-08-04 09:33
Severity ?
EPSS score ?
Summary
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:33:19.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/" }, { "name": "[oss-security] 20200203 Django 3.0.3, 2.2.10 and 1.11.28: CVE-2020-7471: Potential SQL injection via ``StringAgg(delimiter)``", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136" }, { "name": "USN-4264-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4264-1/" }, { "name": "20200219 [SECURITY] [DSA 4629-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Feb/30" }, { "name": "DSA-4629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4629" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200221-0006/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-19T02:06:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/" }, { "name": "[oss-security] 20200203 Django 3.0.3, 2.2.10 and 1.11.28: CVE-2020-7471: Potential SQL injection via ``StringAgg(delimiter)``", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136" }, { "name": "USN-4264-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4264-1/" }, { "name": "20200219 [SECURITY] [DSA 4629-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Feb/30" }, { "name": "DSA-4629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4629" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200221-0006/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-7471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI" }, { "name": "https://docs.djangoproject.com/en/3.0/releases/security/", "refsource": "CONFIRM", "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "name": "https://www.openwall.com/lists/oss-security/2020/02/03/1", "refsource": "CONFIRM", "url": "https://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "name": "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/" }, { "name": "[oss-security] 20200203 Django 3.0.3, 2.2.10 and 1.11.28: CVE-2020-7471: Potential SQL injection via ``StringAgg(delimiter)``", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "name": "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136" }, { "name": "USN-4264-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4264-1/" }, { "name": "20200219 [SECURITY] [DSA 4629-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Feb/30" }, { "name": "DSA-4629", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4629" }, { "name": "https://security.netapp.com/advisory/ntap-20200221-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200221-0006/" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "FEDORA-2020-c2639662af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-7471", "datePublished": "2020-02-03T11:59:20", "dateReserved": "2020-01-21T00:00:00", "dateUpdated": "2024-08-04T09:33:19.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3982
Vulnerability from cvelistv5
Published
2015-06-02 14:00
Modified
2024-08-06 06:04
Severity ?
EPSS score ?
Summary
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
References
▼ | URL | Tags |
---|---|---|
https://www.djangoproject.com/weblog/2015/may/20/security-release/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/74960 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:04:02.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/may/20/security-release/" }, { "name": "74960", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74960" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-02T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/may/20/security-release/" }, { "name": "74960", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74960" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.djangoproject.com/weblog/2015/may/20/security-release/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/may/20/security-release/" }, { "name": "74960", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74960" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3982", "datePublished": "2015-06-02T14:00:00", "dateReserved": "2015-05-13T00:00:00", "dateUpdated": "2024-08-06T06:04:02.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6188
Vulnerability from cvelistv5
Published
2018-02-05 03:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/3559-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securitytracker.com/id/1040422 | vdb-entry, x_refsource_SECTRACK | |
https://www.djangoproject.com/weblog/2018/feb/01/security-releases/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:53.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3559-1/" }, { "name": "1040422", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040422" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3559-1/" }, { "name": "1040422", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040422" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3559-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3559-1/" }, { "name": "1040422", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040422" }, { "name": "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6188", "datePublished": "2018-02-05T03:00:00", "dateReserved": "2018-01-24T00:00:00", "dateUpdated": "2024-08-05T05:54:53.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3444
Vulnerability from cvelistv5
Published
2012-07-31 17:00
Modified
2024-08-06 20:05
Severity ?
EPSS score ?
Summary
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/07/31/1 | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.ubuntu.com/usn/USN-1560-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.openwall.com/lists/oss-security/2012/07/31/2 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2012/dsa-2529 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "name": "MDVSA-2012:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "name": "USN-1560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "name": "DSA-2529", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2529" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-29T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "name": "MDVSA-2012:143", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "name": "USN-1560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "name": "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "name": "DSA-2529", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2529" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3444", "datePublished": "2012-07-31T17:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3498
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-04 19:12
Severity ?
EPSS score ?
Summary
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ | x_refsource_MISC | |
https://docs.djangoproject.com/en/dev/releases/security/ | x_refsource_MISC | |
https://usn.ubuntu.com/3851-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/106453 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2019/jan/04/security-releases/ | x_refsource_MISC | |
https://www.debian.org/security/2019/dsa-4363 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-3851-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3851-1/" }, { "name": "106453", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106453" }, { "name": "[debian-lts-announce] 20190106 [SECURITY] [DLA 1629-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/" }, { "name": "DSA-4363", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4363" }, { "name": "FEDORA-2019-5ad2149e99", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-20T22:06:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-3851-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3851-1/" }, { "name": "106453", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106453" }, { "name": "[debian-lts-announce] 20190106 [SECURITY] [DLA 1629-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/" }, { "name": "DSA-4363", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4363" }, { "name": "FEDORA-2019-5ad2149e99", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-3498", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ" }, { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "USN-3851-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3851-1/" }, { "name": "106453", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106453" }, { "name": "[debian-lts-announce] 20190106 [SECURITY] [DLA 1629-1] python-django security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html" }, { "name": "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/", "refsource": "MISC", "url": "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/" }, { "name": "DSA-4363", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4363" }, { "name": "FEDORA-2019-5ad2149e99", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-3498", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2019-01-01T00:00:00", "dateUpdated": "2024-08-04T19:12:09.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7234
Vulnerability from cvelistv5
Published
2017-04-04 17:00
Modified
2024-08-05 15:56
Severity ?
EPSS score ?
Summary
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038177 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/97401 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2017/dsa-3835 | vendor-advisory, x_refsource_DEBIAN | |
https://www.djangoproject.com/weblog/2017/apr/04/security-releases/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038177", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038177" }, { "name": "97401", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97401" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1038177", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038177" }, { "name": "97401", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97401" }, { "name": "DSA-3835", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3835" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038177", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038177" }, { "name": "97401", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97401" }, { "name": "DSA-3835", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "name": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7234", "datePublished": "2017-04-04T17:00:00", "dateReserved": "2017-03-22T00:00:00", "dateUpdated": "2024-08-05T15:56:36.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41990
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-09-18 14:57
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "lessThan": "4.2.15", "status": "affected", "version": "4.2", "versionType": "custom" }, { "lessThan": "5.0.8", "status": "affected", "version": "5.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "lessThan": "pkg:pypi/django@4.2.15", "status": "affected", "version": "pkg:pypi/django@4.2", "versionType": "custom" }, { "lessThan": "pkg:pypi/django@5.0.8", "status": "affected", "version": "pkg:pypi/django@5.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41990", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T15:20:51.732074Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T14:57:21.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T14:11:45.667382", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-41990", "datePublished": "2024-08-07T00:00:00", "dateReserved": "2024-07-25T00:00:00", "dateUpdated": "2024-09-18T14:57:21.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0697
Vulnerability from cvelistv5
Published
2011-02-14 20:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:26.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43297" }, { "name": "43382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43382" }, { "name": "ADV-2011-0439", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "name": "ADV-2011-0429", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "name": "43230", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43230" }, { "name": "43426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676359" }, { "name": "ADV-2011-0372", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "name": "FEDORA-2011-1261", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "name": "ADV-2011-0441", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "name": "USN-1066-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "name": "46296", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46296" }, { "name": "MDVSA-2011:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "name": "DSA-2163", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2163" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "name": "ADV-2011-0388", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "name": "FEDORA-2011-1235", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-23T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43297" }, { "name": "43382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43382" }, { "name": "ADV-2011-0439", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "name": "ADV-2011-0429", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "name": "43230", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43230" }, { "name": "43426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676359" }, { "name": "ADV-2011-0372", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "name": "FEDORA-2011-1261", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "name": "ADV-2011-0441", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "name": "USN-1066-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "name": "46296", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46296" }, { "name": "MDVSA-2011:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "name": "DSA-2163", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2163" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "name": "ADV-2011-0388", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "name": "FEDORA-2011-1235", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0697", "datePublished": "2011-02-14T20:00:00", "dateReserved": "2011-01-31T00:00:00", "dateUpdated": "2024-08-06T21:58:26.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2513
Vulnerability from cvelistv5
Published
2016-04-08 15:00
Modified
2024-08-05 23:32
Severity ?
EPSS score ?
Summary
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:32:20.440Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0506", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab" }, { "name": "1035152", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035152" }, { "name": "RHSA-2016:0504", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "name": "DSA-3544", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3544" }, { "name": "RHSA-2016:0502", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "name": "USN-2915-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "name": "83878", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/83878" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2915-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "name": "RHSA-2016:0505", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "name": "USN-2915-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2016:0506", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab" }, { "name": "1035152", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035152" }, { "name": "RHSA-2016:0504", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "name": "DSA-3544", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3544" }, { "name": "RHSA-2016:0502", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "name": "USN-2915-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "name": "83878", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/83878" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2915-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "name": "RHSA-2016:0505", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "name": "USN-2915-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-2513", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:0506", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "name": "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab" }, { "name": "1035152", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035152" }, { "name": "RHSA-2016:0504", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "name": "DSA-3544", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3544" }, { "name": "RHSA-2016:0502", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "name": "USN-2915-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "name": "83878", "refsource": "BID", "url": "http://www.securityfocus.com/bid/83878" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "USN-2915-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "name": "RHSA-2016:0505", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "name": "USN-2915-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "name": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-2513", "datePublished": "2016-04-08T15:00:00", "dateReserved": "2016-02-19T00:00:00", "dateUpdated": "2024-08-05T23:32:20.440Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5143
Vulnerability from cvelistv5
Published
2015-07-14 17:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "GLSA-201510-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-06" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "openSUSE-SU-2015:1802", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "name": "openSUSE-SU-2015:1813", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "name": "DSA-3305", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "name": "RHSA-2015:1678", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1678.html" }, { "name": "75666", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75666" }, { "name": "RHSA-2015:1686", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1686.html" }, { "name": "USN-2671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "name": "1032820", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032820" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-21T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2015-1dd5bc998f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "GLSA-201510-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-06" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "openSUSE-SU-2015:1802", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "name": "openSUSE-SU-2015:1813", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "name": "DSA-3305", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "name": "RHSA-2015:1678", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1678.html" }, { "name": "75666", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75666" }, { "name": "RHSA-2015:1686", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1686.html" }, { "name": "USN-2671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "name": "1032820", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032820" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-1dd5bc998f", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "name": "GLSA-201510-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-06" }, { "name": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "name": "openSUSE-SU-2015:1802", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "name": "openSUSE-SU-2015:1813", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "name": "DSA-3305", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3305" }, { "name": "RHSA-2015:1678", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1678.html" }, { "name": "75666", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75666" }, { "name": "RHSA-2015:1686", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1686.html" }, { "name": "USN-2671-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "name": "1032820", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032820" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5143", "datePublished": "2015-07-14T17:00:00", "dateReserved": "2015-06-29T00:00:00", "dateUpdated": "2024-08-06T06:32:32.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14233
Vulnerability from cvelistv5
Published
2019-08-02 14:31
Modified
2024-08-05 00:12
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
References
▼ | URL | Tags |
---|---|---|
https://docs.djangoproject.com/en/dev/releases/security/ | x_refsource_MISC | |
https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2019/aug/01/security-releases/ | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html | vendor-advisory, x_refsource_SUSE | |
https://seclists.org/bugtraq/2019/Aug/15 | mailing-list, x_refsource_BUGTRAQ | |
https://www.debian.org/security/2019/dsa-4498 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/ | vendor-advisory, x_refsource_FEDORA | |
https://security.netapp.com/advisory/ntap-20190828-0002/ | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202004-17 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:42.524Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-01T01:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs" }, { "name": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "openSUSE-SU-2019:1839", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "name": "https://security.netapp.com/advisory/ntap-20190828-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14233", "datePublished": "2019-08-02T14:31:09", "dateReserved": "2019-07-22T00:00:00", "dateUpdated": "2024-08-05T00:12:42.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31047
Vulnerability from cvelistv5
Published
2023-05-07 00:00
Modified
2024-08-02 14:45
Severity ?
EPSS score ?
Summary
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:45:25.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases/" }, { "name": "FEDORA-2023-0d20d09f2d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/" }, { "name": "FEDORA-2023-8f9d949dbc", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230609-0008/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django\u0027s \"Uploading multiple files\" documentation suggested otherwise." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-09T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases/" }, { "name": "FEDORA-2023-0d20d09f2d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/" }, { "name": "FEDORA-2023-8f9d949dbc", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/" }, { "url": "https://security.netapp.com/advisory/ntap-20230609-0008/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-31047", "datePublished": "2023-05-07T00:00:00", "dateReserved": "2023-04-24T00:00:00", "dateUpdated": "2024-08-02T14:45:25.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14234
Vulnerability from cvelistv5
Published
2019-08-09 12:16
Modified
2024-08-05 00:12
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
References
▼ | URL | Tags |
---|---|---|
https://docs.djangoproject.com/en/dev/releases/security/ | x_refsource_MISC | |
https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2019/aug/01/security-releases/ | x_refsource_CONFIRM | |
https://seclists.org/bugtraq/2019/Aug/15 | mailing-list, x_refsource_BUGTRAQ | |
https://www.debian.org/security/2019/dsa-4498 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/ | vendor-advisory, x_refsource_FEDORA | |
https://security.netapp.com/advisory/ntap-20190828-0002/ | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202004-17 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:42.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of \"OR 1=1\" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-01T01:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of \"OR 1=1\" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/dev/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs" }, { "name": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "name": "20190812 [SECURITY] [DSA 4498-1] python-django security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "name": "DSA-4498", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "name": "openSUSE-SU-2019:1872", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "name": "FEDORA-2019-647f74ce51", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "name": "https://security.netapp.com/advisory/ntap-20190828-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14234", "datePublished": "2019-08-09T12:16:44", "dateReserved": "2019-07-22T00:00:00", "dateUpdated": "2024-08-05T00:12:42.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4535
Vulnerability from cvelistv5
Published
2011-01-10 19:18
Modified
2024-08-07 03:51
Severity ?
EPSS score ?
Summary
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:51:17.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.djangoproject.com/changeset/15032" }, { "name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "name": "USN-1040-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "name": "45563", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45563" }, { "name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "name": "42913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42913" }, { "name": "ADV-2011-0048", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "name": "ADV-2011-0098", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "name": "FEDORA-2011-0096", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" }, { "name": "42715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42715" }, { "name": "FEDORA-2011-0120", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "name": "42827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42827" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-19T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.djangoproject.com/changeset/15032" }, { "name": "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "name": "USN-1040-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "name": "45563", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45563" }, { "name": "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "name": "42913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42913" }, { "name": "ADV-2011-0048", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "name": "ADV-2011-0098", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "name": "FEDORA-2011-0096", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" }, { "name": "42715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42715" }, { "name": "FEDORA-2011-0120", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "name": "42827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42827" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4535", "datePublished": "2011-01-10T19:18:00", "dateReserved": "2010-12-09T00:00:00", "dateUpdated": "2024-08-07T03:51:17.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0698
Vulnerability from cvelistv5
Published
2011-02-14 20:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0439 | vdb-entry, x_refsource_VUPEN | |
http://openwall.com/lists/oss-security/2011/02/09/6 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/43230 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2011/0372 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/46296 | vdb-entry, x_refsource_BID | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:031 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.djangoproject.com/weblog/2011/feb/08/security/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:26.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0439", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "name": "43230", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43230" }, { "name": "ADV-2011-0372", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "name": "46296", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46296" }, { "name": "MDVSA-2011:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-23T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2011-0439", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "name": "43230", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43230" }, { "name": "ADV-2011-0372", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "name": "46296", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46296" }, { "name": "MDVSA-2011:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0698", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0439", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "name": "43230", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43230" }, { "name": "ADV-2011-0372", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "name": "46296", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46296" }, { "name": "MDVSA-2011:031", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "name": "http://www.djangoproject.com/weblog/2011/feb/08/security/", "refsource": "CONFIRM", "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0698", "datePublished": "2011-02-14T20:00:00", "dateReserved": "2011-01-31T00:00:00", "dateUpdated": "2024-08-06T21:58:26.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9402
Vulnerability from cvelistv5
Published
2020-03-05 14:49
Modified
2024-08-04 10:26
Severity ?
EPSS score ?
Summary
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
References
▼ | URL | Tags |
---|---|---|
https://docs.djangoproject.com/en/3.0/releases/security/ | x_refsource_MISC | |
https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY | x_refsource_MISC | |
https://www.djangoproject.com/weblog/2020/mar/04/security-releases/ | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4296-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.netapp.com/advisory/ntap-20200327-0004/ | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202004-17 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2020/dsa-4705 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:26:16.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/" }, { "name": "USN-4296-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4296-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0004/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "DSA-4705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "name": "FEDORA-2020-2e7d30f7aa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/" }, { "name": "[debian-lts-announce] 20220526 [SECURITY] [DLA 3024-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-26T12:06:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/" }, { "name": "USN-4296-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4296-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0004/" }, { "name": "GLSA-202004-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "DSA-4705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "name": "FEDORA-2020-2e7d30f7aa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/" }, { "name": "[debian-lts-announce] 20220526 [SECURITY] [DLA 3024-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-9402", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.djangoproject.com/en/3.0/releases/security/", "refsource": "MISC", "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "name": "https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY" }, { "name": "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/" }, { "name": "USN-4296-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4296-1/" }, { "name": "https://security.netapp.com/advisory/ntap-20200327-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200327-0004/" }, { "name": "GLSA-202004-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202004-17" }, { "name": "DSA-4705", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4705" }, { "name": "FEDORA-2020-c2639662af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "name": "FEDORA-2020-2e7d30f7aa", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/" }, { "name": "[debian-lts-announce] 20220526 [SECURITY] [DLA 3024-1] python-django security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-9402", "datePublished": "2020-03-05T14:49:57", "dateReserved": "2020-02-25T00:00:00", "dateUpdated": "2024-08-04T10:26:16.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4520
Vulnerability from cvelistv5
Published
2012-11-18 23:00
Modified
2024-08-06 20:42
Severity ?
EPSS score ?
Summary
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:53.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20121029 Re: CVE Request: Django", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/30/4" }, { "name": "1027708", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1027708" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071" }, { "name": "86493", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/86493" }, { "name": "51314", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51314" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145" }, { "name": "FEDORA-2012-16440", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html" }, { "name": "USN-1757-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-1757-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3" }, { "name": "DSA-2634", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2634" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2012/oct/17/security/" }, { "name": "FEDORA-2012-16417", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e" }, { "name": "51033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51033" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865164" }, { "name": "FEDORA-2012-16406", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html" }, { "name": "USN-1632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-1632-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-04T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20121029 Re: CVE Request: Django", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/30/4" }, { "name": "1027708", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1027708" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071" }, { "name": "86493", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/86493" }, { "name": "51314", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51314" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145" }, { "name": "FEDORA-2012-16440", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html" }, { "name": "USN-1757-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-1757-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3" }, { "name": "DSA-2634", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2634" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2012/oct/17/security/" }, { "name": "FEDORA-2012-16417", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e" }, { "name": "51033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51033" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865164" }, { "name": "FEDORA-2012-16406", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html" }, { "name": "USN-1632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-1632-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4520", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20121029 Re: CVE Request: Django", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/10/30/4" }, { "name": "1027708", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1027708" }, { "name": "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071" }, { "name": "86493", "refsource": "OSVDB", "url": "http://www.osvdb.org/86493" }, { "name": "51314", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51314" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145", "refsource": "MISC", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145" }, { "name": "FEDORA-2012-16440", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html" }, { "name": "USN-1757-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-1757-1" }, { "name": "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3" }, { "name": "DSA-2634", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2634" }, { "name": "https://www.djangoproject.com/weblog/2012/oct/17/security/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2012/oct/17/security/" }, { "name": "FEDORA-2012-16417", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html" }, { "name": "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e", "refsource": "CONFIRM", "url": "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e" }, { "name": "51033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51033" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=865164", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865164" }, { "name": "FEDORA-2012-16406", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html" }, { "name": "USN-1632-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-1632-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4520", "datePublished": "2012-11-18T23:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:42:53.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41164
Vulnerability from cvelistv5
Published
2023-11-03 00:00
Modified
2024-08-02 18:54
Severity ?
EPSS score ?
Summary
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "tags": [ "x_transferred" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "tags": [ "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/" }, { "name": "FEDORA-2023-a67af7d8f4", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231214-0002/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-20T03:06:02.315105", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "url": "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/" }, { "name": "FEDORA-2023-a67af7d8f4", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "url": "https://security.netapp.com/advisory/ntap-20231214-0002/" }, { "name": "FEDORA-2024-84fbbbb914", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41164", "datePublished": "2023-11-03T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-08-02T18:54:03.498Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42005
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-09-03 17:36
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "django", "vendor": "djangoproject", "versions": [ { "lessThan": "4.2.15", "status": "affected", "version": "4.2", "versionType": "custom" }, { "lessThan": "5.0.8", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-42005", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T20:19:17.076015Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-03T17:36:29.599Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T14:14:51.264922", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-42005", "datePublished": "2024-08-07T00:00:00", "dateReserved": "2024-07-26T00:00:00", "dateUpdated": "2024-09-03T17:36:29.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7537
Vulnerability from cvelistv5
Published
2018-03-09 20:00
Modified
2024-08-05 06:31
Severity ?
EPSS score ?
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/3591-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html | mailing-list, x_refsource_MLIST | |
https://www.djangoproject.com/weblog/2018/mar/06/security-releases/ | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:2927 | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/103357 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2019:0265 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4161 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "name": "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "103357", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103357" }, { "name": "RHSA-2019:0265", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "DSA-4161", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator\u0027s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-04T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3591-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "name": "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "103357", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103357" }, { "name": "RHSA-2019:0265", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "DSA-4161", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7537", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator\u0027s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3591-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3591-1/" }, { "name": "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "name": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/", "refsource": "CONFIRM", "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" }, { "name": "RHSA-2018:2927", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "103357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103357" }, { "name": "RHSA-2019:0265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "name": "DSA-4161", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4161" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7537", "datePublished": "2018-03-09T20:00:00", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-08-05T06:31:04.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-02-02 07:15
Modified
2024-11-21 06:21
Severity ?
Summary
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 33 | |
netapp | snapcenter | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "46A5C187-6988-47C2-9557-51DA3B5A5E43", "versionEndExcluding": "2.2.18", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC2B0286-FDDA-45E1-9996-FA5B8C53F0B1", "versionEndExcluding": "3.0.12", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A6BDD7A-AB21-442B-8137-7508B7E72ACC", "versionEndExcluding": "3.1.6", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by \"startapp --template\" and \"startproject --template\") allows directory traversal via an archive with absolute paths or relative paths with dot segments." }, { "lang": "es", "value": "En Django versiones 2.2 anteriores a 2.2.18, versiones 3.0 anteriores a 3.0.12 y versiones 3.1 anteriores a 3.1.6, el m\u00e9todo django.utils.archive.extract (usado por \"startapp --template\" y \"startproject --template\") permite un salto de directorios por medio de un archivo con rutas absolutas o rutas relativas con segmentos de puntos" } ], "id": "CVE-2021-3281", "lastModified": "2024-11-21T06:21:12.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-02T07:15:14.020", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0004/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210226-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-03 13:15
Modified
2024-11-21 08:09
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
debian | debian_linux | 12.0 | |
fedoraproject | fedora | 37 | |
fedoraproject | fedora | 38 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3100A051-B070-4C3E-B192-51CF3D1C4B46", "versionEndExcluding": "3.2.20", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BA4371C-EE73-4D0C-87B1-ECDD0B1E5387", "versionEndExcluding": "4.1.10", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A53AB7F4-CE96-459E-A2D7-BF331976C289", "versionEndExcluding": "4.2.3", "versionStartIncluding": "4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs." } ], "id": "CVE-2023-36053", "lastModified": "2024-11-21T08:09:14.967", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-07-03T13:15:09.737", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5465" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1333" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-1333" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.91 | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.95.1 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "96EC0AAD-1199-4CDB-B599-A7959A160CB6", "versionEndIncluding": "1.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "C40AD94B-AC89-4404-973F-5E60468D06EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A952FB-3A74-4A39-8870-1F37059C9D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*", "matchCriteriaId": "F75FE4BB-2C64-404F-9347-25289556BE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*", "matchCriteriaId": "AF1504F2-968F-4E1A-A143-BE494E658DF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL\u0027s validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header." }, { "lang": "es", "value": "La funcionalidad verify_exists de la implementaci\u00f3n URLField en Django antes de su versi\u00f3n v1.2.7 y en v1.3.x antes de v1.3.1 originalmente comprueba la validez de una URL a trav\u00e9s de una petici\u00f3n HEAD, pero luego usa una petici\u00f3n GET de la URL en el caso de un redireccionamiento. Esto podr\u00eda permitir a atacantes remotos para provocar peticiones GET aleatorias con una direcci\u00f3n IP de origen no deseados a trav\u00e9s de una cabecera Location especificamente modificada." } ], "id": "CVE-2011-4138", "lastModified": "2024-11-21T01:31:55.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-19T10:55:04.457", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/46614" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EA690BD-2FBA-425B-AC6F-046081E21183", "versionEndIncluding": "1.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFC18F77-77CB-45CB-869E-267DACD19601", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header." }, { "lang": "es", "value": "El middleware contrib.auth.middleware.RemoteUserMiddleware en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3, cuando utiliza el backend contrib.auth.backends.RemoteUserBackend, permite a usuarios remotos autenticados secuestrar sesiones web a trav\u00e9s de vectores relacionados con la cabecera REMOTE_USER." } ], "id": "CVE-2014-0482", "lastModified": "2024-11-21T02:02:13.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-26T14:55:05.297", "references": [ { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/59782" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61276" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-04 16:15
Modified
2024-11-21 07:09
Severity ?
Summary
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8994946A-B3AF-430F-A916-AF1B127897AB", "versionEndExcluding": "3.2.14", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "843DA6AD-07C5-4494-B43B-0BB646AFC809", "versionEndExcluding": "4.0.6", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected." }, { "lang": "es", "value": "Se ha detectado un problema en Django versiones 3.2 anteriores a 3.2.14 y 4.0 anteriores a 4.0.6. Las funciones de base de datos Trunc() y Extract() est\u00e1n sujetas a inyecci\u00f3n SQL si son usados datos no confiables como valor de kind/lookup_name. Las aplicaciones que restringen el nombre de b\u00fasqueda y la elecci\u00f3n del tipo a una lista segura conocida no est\u00e1n afectadas" } ], "id": "CVE-2022-34265", "lastModified": "2024-11-21T07:09:10.777", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-04T16:15:09.260", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220818-0006/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220818-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-07 13:29
Modified
2024-11-21 03:10
Severity ?
Summary
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/100643 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1039264 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://usn.ubuntu.com/3559-1/ | ||
cve@mitre.org | https://www.djangoproject.com/weblog/2017/sep/05/security-releases/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100643 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039264 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3559-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.djangoproject.com/weblog/2017/sep/05/security-releases/ | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.10.0 | |
djangoproject | django | 1.10.1 | |
djangoproject | django | 1.10.2 | |
djangoproject | django | 1.10.3 | |
djangoproject | django | 1.10.4 | |
djangoproject | django | 1.10.5 | |
djangoproject | django | 1.10.6 | |
djangoproject | django | 1.10.7 | |
djangoproject | django | 1.11.0 | |
djangoproject | django | 1.11.1 | |
djangoproject | django | 1.11.2 | |
djangoproject | django | 1.11.3 | |
djangoproject | django | 1.11.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D2541CE-0462-46DF-BDD8-C19D6E45140B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CE31960-7C68-42F3-B215-B30A87DB67CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D6C6214-7946-4025-84E6-59448CFE75B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "58182835-CB1F-4490-AE65-90601DBFD0D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "04AE04CD-E923-4630-9BAA-5A4D5A5D0055", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2517FB1C-B732-432B-9F27-EE60F6556433", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "28F4BB27-B6AF-47AD-9301-DDFF4198B9F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC58EB0F-6DE0-450B-A963-2CA4084BDE71", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "437E4D87-F5C9-4954-9882-396C0ADF649E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "D64C7397-B2A8-4C93-AC09-337E243A7483", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F3CDEA7-EFB7-4F4B-872B-1D18CDE340CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "08EFE4B2-E975-4842-BCAB-528D03F4AB73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn\u0027t affect most production sites since you shouldn\u0027t run with \"DEBUG = True\" (which makes this page accessible) in your production settings." }, { "lang": "es", "value": "En Django versiones 1.10.x anteriores a la 1.10.8 y versiones 1.11.x anteriores a la 1.11.5, se deshabilit\u00f3 la funci\u00f3n de autoescapado HTML en una parte de la plantilla para la p\u00e1gina de depuraci\u00f3n technical 500. En las condiciones adecuadas, esto permitir\u00eda un ataque de Cross-Site Scripting (XSS). Esta vulnerabilidad no deber\u00eda afectar a la mayor\u00eda de sitios de producci\u00f3n, ya que no se deber\u00eda ejecutar el programa con \"DEBUG = True\" (lo que hace que esta p\u00e1gina sea accesible) en la configuraci\u00f3n de producci\u00f3n." } ], "id": "CVE-2017-12794", "lastModified": "2024-11-21T03:10:12.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-07T13:29:00.467", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100643" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039264" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3559-1/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3559-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-03 14:15
Modified
2024-11-21 05:00
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 32 | |
netapp | sra_plugin | - | |
netapp | steelstore_cloud_integrated_storage | - | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
oracle | zfs_storage_appliance_kit | 8.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "93BB1B8B-778D-4625-BCA4-245FA7CB7EB3", "versionEndExcluding": "2.2.13", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8843BC60-8D53-469D-A194-BB5259C317E8", "versionEndExcluding": "3.0.7", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:sra_plugin:-:*:*:*:*:linux:*:*", "matchCriteriaId": "96EEC4C4-E4A9-4CB3-8801-2DD26C00AC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 2.2 anteriores a 2.2.13 y versiones 3.0 anteriores a 3.0.7. En casos donde un backend memcached no lleva a cabo una comprobaci\u00f3n de la clave, pasa claves de cach\u00e9 maliciosas que podr\u00eda resultar en una colisi\u00f3n de claves y una potencial filtraci\u00f3n de datos." } ], "id": "CVE-2020-13254", "lastModified": "2024-11-21T05:00:53.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-03T14:15:12.563", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-23 15:55
Modified
2024-11-21 02:02
Severity ?
Summary
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.4.3 | |
djangoproject | django | 1.4.4 | |
djangoproject | django | 1.4.5 | |
djangoproject | django | 1.4.6 | |
djangoproject | django | 1.4.7 | |
djangoproject | django | 1.4.8 | |
djangoproject | django | 1.4.9 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5.1 | |
djangoproject | django | 1.5.2 | |
djangoproject | django | 1.5.3 | |
djangoproject | django | 1.5.4 | |
djangoproject | django | 1.5.5 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.10 | |
canonical | ubuntu_linux | 14.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D817D6FC-F568-46C9-B49E-7CD7457756E4", "versionEndIncluding": "1.4.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EDEF8A4-F929-49AB-A8CD-E40CCCDB638C", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5463AB51-6088-473A-BB54-BB78ACFC6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:alpha1:*:*:*:*:*:*", "matchCriteriaId": "14EC0E5B-2CEC-450A-B5A2-16BE4147DB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:alpha2:*:*:*:*:*:*", "matchCriteriaId": "EDD55056-2537-4E69-9D9D-2697501C0EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a \"dotted Python path.\"" }, { "lang": "es", "value": "La funci\u00f3n django.core.urlresolvers.reverse en Django anterior a 1.4.11, 1.5.x anterior a 1.5.6, 1.6.x anterior a 1.6.3 y 1.7.x anterior a 1.7 beta 2 permite a atacantes remotos importar y ejecutar m\u00f3dulos Python arbitrarios mediante el aprovechamiento de una visualizaci\u00f3n que construye URLs utilizando entradas de usuarios y una \"ruta Python con puntos.\"" } ], "id": "CVE-2014-0472", "lastModified": "2024-11-21T02:02:12.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-23T15:55:02.923", "references": [ { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "security@debian.org", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.91 | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.95.1 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "96EC0AAD-1199-4CDB-B599-A7959A160CB6", "versionEndIncluding": "1.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "C40AD94B-AC89-4404-973F-5E60468D06EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A952FB-3A74-4A39-8870-1F37059C9D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*", "matchCriteriaId": "F75FE4BB-2C64-404F-9347-25289556BE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*", "matchCriteriaId": "AF1504F2-968F-4E1A-A143-BE494E658DF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django before 1.2.7 and 1.3.x before 1.3.1 uses a request\u0027s HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request." }, { "lang": "es", "value": "Django v1.2.7 y v1.3.x anterior a v1.3.1 usa la cabecera de una petici\u00f3n HTTP host para la construcci\u00f3n de una direcci\u00f3n URL completa, en determinadas circunstancias, lo que permite a atacantes remotos para realizar ataques de envenenamiento de cach\u00e9 a trav\u00e9s de una solicitud manipulada." } ], "id": "CVE-2011-4139", "lastModified": "2024-11-21T01:31:55.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-19T10:55:04.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/46614" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-02-08 19:59
Modified
2024-11-21 02:47
Severity ?
Summary
Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.9 | |
djangoproject | django | 1.9.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the \"Save as New\" option when editing objects and leveraging the \"change\" permission." }, { "lang": "es", "value": "Django 1.9.x en versiones anteriores a 1.9.2, cuando ModelAdmin.save_as se establece a verdadero, permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso y crear objetos ModelAdmin a trav\u00e9s de la opci\u00f3n \"Save as New\" cuando se editan objetos y se aprovecha el permiso \"change\"." } ], "id": "CVE-2016-2048", "lastModified": "2024-11-21T02:47:41.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-02-08T19:59:05.470", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/82329" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1034894" }, { "source": "cve@mitre.org", "url": "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/82329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-04 17:55
Modified
2024-11-21 01:55
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5.1 | |
djangoproject | django | 1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField." }, { "lang": "es", "value": "Vulnerabilidad de XSS en el widget AdminURLFieldWidget en contrib/admin/widgets.py de Django 1.5.x anterior a la versi\u00f3n 1.5.2 y 1.6.x anterior a 1.6 beta 2 permite a atacantes remotos inyectar script web arbitrario o HTML a trav\u00e9s de una URLField." } ], "id": "CVE-2013-4249", "lastModified": "2024-11-21T01:55:12.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-10-04T17:55:09.807", "references": [ { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q3/411" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54476" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1028915" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560" }, { "source": "secalert@redhat.com", "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q3/411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-08-07 20:49
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.djangoproject.com/en/dev/releases/security/ | Patch, Vendor Advisory | |
cve@mitre.org | https://groups.google.com/forum/#%21forum/django-announce | Not Applicable | |
cve@mitre.org | https://www.djangoproject.com/weblog/2024/aug/06/security-releases/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C38224F-C41B-428C-89C2-603BBA95AD3C", "versionEndExcluding": "4.2.15", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3384B57C-DBF5-4E23-99E7-92B260D53E8E", "versionEndExcluding": "5.0.8", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. Los filtros de plantilla urlize() y urlizetrunc() est\u00e1n sujetos a un posible ataque de denegaci\u00f3n de servicio a trav\u00e9s de entradas muy grandes con una secuencia espec\u00edfica de caracteres." } ], "id": "CVE-2024-41990", "lastModified": "2024-08-07T20:49:50.480", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-08-07T15:15:56.100", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-130" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-03 18:59
Modified
2024-11-21 02:57
Severity ?
Summary
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
djangoproject | django | * | |
djangoproject | django | 1.9.0 | |
djangoproject | django | 1.9.1 | |
djangoproject | django | 1.9.2 | |
djangoproject | django | 1.9.3 | |
djangoproject | django | 1.9.4 | |
djangoproject | django | 1.9.5 | |
djangoproject | django | 1.9.6 | |
djangoproject | django | 1.9.7 | |
djangoproject | django | 1.9.8 | |
djangoproject | django | 1.9.9 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "66FE8806-7FCB-4CFD-9EAF-05F2ED9F6B9B", "versionEndIncluding": "1.8.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4BDA562-AB2E-457C-8DA5-32AB90CB5E3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A18691A7-E4D0-48A4-81A7-89846E991AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C06EBD9-381E-4018-BFDC-E23EA18097B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7D134048-B64F-45AE-B4A2-26E516CCF37B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "64A4030E-F51F-4944-BCE7-E27CD32EC7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "CCC1F046-DAF7-4734-9F80-A3C57857AF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "61EE8536-0E8D-477A-B8EA-817CE21D516A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies." }, { "lang": "es", "value": "El c\u00f3digo de an\u00e1lisis de cookie en Django en versiones anteriores a 1.8.15 y 1.9.x en versiones anteriores a 1.9.10, cuando se utiliza en un sitio con Google Analytics, permite a atacantes remotos eludir un mecanismo de protecci\u00f3n CSRF destinado estableciendo cookies arbitrarias." } ], "id": "CVE-2016-7401", "lastModified": "2024-11-21T02:57:55.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-03T18:59:13.137", "references": [ { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2038.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2039.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2040.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2041.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2042.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2043.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3678" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/93182" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securitytracker.com/id/1036899" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3089-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/93182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securitytracker.com/id/1036899" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3089-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-23 15:55
Modified
2024-11-21 02:02
Severity ?
Summary
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to "MySQL typecasting."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.10 | |
canonical | ubuntu_linux | 14.04 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | * | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.4.3 | |
djangoproject | django | 1.4.4 | |
djangoproject | django | 1.4.5 | |
djangoproject | django | 1.4.6 | |
djangoproject | django | 1.4.7 | |
djangoproject | django | 1.4.8 | |
djangoproject | django | 1.4.9 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5.1 | |
djangoproject | django | 1.5.2 | |
djangoproject | django | 1.5.3 | |
djangoproject | django | 1.5.4 | |
djangoproject | django | 1.5.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5463AB51-6088-473A-BB54-BB78ACFC6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D817D6FC-F568-46C9-B49E-7CD7457756E4", "versionEndIncluding": "1.4.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EDEF8A4-F929-49AB-A8CD-E40CCCDB638C", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:alpha1:*:*:*:*:*:*", "matchCriteriaId": "14EC0E5B-2CEC-450A-B5A2-16BE4147DB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:alpha2:*:*:*:*:*:*", "matchCriteriaId": "EDD55056-2537-4E69-9D9D-2697501C0EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to \"MySQL typecasting.\"" }, { "lang": "es", "value": "Las clases de campo de modelo (1) FilePathField, (2) GenericIPAddressField y (3) IPAddressField en Django anterior a 1.4.11, 1.5.x anterior a 1.5.6, 1.6.x anterior a1.6.3 y 1.7.x anterior a 1.7 beta 2 no realizan debidamente conversi\u00f3n de tipo, lo que permite a atacantes remotos tener impacto y vectores no especificados, relacionado con \"MySQL typecasting.\"" } ], "id": "CVE-2014-0474", "lastModified": "2024-11-21T02:02:12.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-23T15:55:03.237", "references": [ { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "security@debian.org", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-04 17:59
Modified
2024-11-21 03:31
Severity ?
Summary
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:a1:*:*:*:*:*:*", "matchCriteriaId": "85ED1834-500C-4E37-BD51-E42DB28F3B67", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:b1:*:*:*:*:*:*", "matchCriteriaId": "E6E3323E-6AC0-4703-A3A4-A429946B0839", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:b2:*:*:*:*:*:*", "matchCriteriaId": "7AB300FB-2A7D-498E-891D-E75DCA9ED7A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:c1:*:*:*:*:*:*", "matchCriteriaId": "1AC1822A-A7FE-4F38-BD5A-74388A5405D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "63D36984-4C8E-4CDB-8D15-445705FCECF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B324AE6-ADD8-41B9-B250-A6577ACBB364", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6487058-6768-4AD3-BE27-A0B3D1ACFC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CFF0538-B111-44A8-ADC2-87E280186257", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "C3343FF8-53EC-459D-B31C-CD363D04FF42", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "B9B637E9-067A-4473-9B50-433CCC177982", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "99A5BF6D-631B-4C8E-9868-579BD79100C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "280B9958-9163-4126-910A-2EF4B408DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "6A40373B-301E-4B81-8FA5-28D916142F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "79BB3174-7859-4195-B7B3-BCAA280A6F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "42EF41AF-B2FA-468A-B161-D9FE29CE53EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "48DF0100-F98E-4997-A8F7-DC07FA4A06D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "ECDC5647-8EA7-4595-88C2-541BC489ED2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.16:*:*:*:*:*:*:*", "matchCriteriaId": "EB571E66-C1B2-4FFD-8265-FB381CF4ACE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "C49F25DA-CD52-49A9-B5BE-63FD399A9813", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:a1:*:*:*:*:*:*", "matchCriteriaId": "0B4797F9-82E9-4BA8-868D-C6F18BA01DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:b1:*:*:*:*:*:*", "matchCriteriaId": "E885D945-FB55-47F4-AA6B-462AFBDAD750", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:rc1:*:*:*:*:*:*", "matchCriteriaId": "48BD4296-E83B-4563-9A39-70C95EEAA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:rc2:*:*:*:*:*:*", "matchCriteriaId": "F63D8C0A-D93E-4A1F-A8F8-D22314771AD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A18691A7-E4D0-48A4-81A7-89846E991AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C06EBD9-381E-4018-BFDC-E23EA18097B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7D134048-B64F-45AE-B4A2-26E516CCF37B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "64A4030E-F51F-4944-BCE7-E27CD32EC7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "CCC1F046-DAF7-4734-9F80-A3C57857AF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "61EE8536-0E8D-477A-B8EA-817CE21D516A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "483D0F44-15C8-43A2-B3AE-331F40DA1A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "DD33E383-2772-4F79-A2C9-4F9EB8FBC8EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "77D82BAD-B2AE-49FB-AF71-393631D2B29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D2541CE-0462-46DF-BDD8-C19D6E45140B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:a1:*:*:*:*:*:*", "matchCriteriaId": "1763E8EB-F943-4A9A-8E19-E6BE9F847DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:b1:*:*:*:*:*:*", "matchCriteriaId": "48E20213-67BB-4A16-B961-502BA4E54A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3C71C2E3-C134-45B0-BDDC-FFE7612AB1EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CE31960-7C68-42F3-B215-B30A87DB67CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D6C6214-7946-4025-84E6-59448CFE75B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "58182835-CB1F-4490-AE65-90601DBFD0D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "04AE04CD-E923-4630-9BAA-5A4D5A5D0055", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2517FB1C-B732-432B-9F27-EE60F6556433", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn\u0027t be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack." }, { "lang": "es", "value": "Django 1.10 en versiones anteriores a 1.10.7, 1.9 en versiones anteriores a 1.9.13, y 1.8 en versiones anteriores a 1.8.18 se basa en la entrada del usuario en algunos casos para redirigir al usuario a una URL de \"\u00e9xito\". La comprobaci\u00f3n de seguridad de estos redireccionamientos (a saber, `` django.utils.http.is_safe_url()``) considera que algunas URL num\u00e9ricas son \"seguras\" cuando no deber\u00edan serlo, tambi\u00e9n conocida como una vulnerabilidad de redirecci\u00f3n abierta. Adem\u00e1s, si un desarrollador conf\u00eda en `` is_safe_url() `` para proporcionar destinos de redirecci\u00f3n seguros y pone esa URL en un enlace, podr\u00eda sufrir un ataque XSS." } ], "id": "CVE-2017-7233", "lastModified": "2024-11-21T03:31:25.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-04T17:59:00.273", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97406" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038177" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1445" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1451" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1462" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1470" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1596" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:3093" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:3093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-06 16:15
Modified
2024-11-21 06:06
Severity ?
Summary
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
python | python | * | |
fedoraproject | fedora | 34 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED7CB1DC-4D83-4D30-8778-D3DC95D636A8", "versionEndExcluding": "2.2.22", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F5F0697-2B95-41DA-BDAE-CAE64BFF11D2", "versionEndExcluding": "3.1.10", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCDAA914-CAC5-4F6F-AAC7-B586115EA2EE", "versionEndExcluding": "3.2.2", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6A6F7D1-9BD9-46A1-81FA-3FCE1B4CCFC5", "versionStartIncluding": "3.9.5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers." }, { "lang": "es", "value": "En Django 2.2 versiones anteriores a 2.2.22, 3.1 versiones anteriores a 3.1.10 y 3.2 versiones anteriores a 3.2.2 (con Python 3.9.5+), URLValidator no proh\u00edbe nuevas l\u00edneas y pesta\u00f1as (a menos que sea usado el campo URLField form).\u0026#xa0;Si una aplicaci\u00f3n usa valores con nuevas l\u00edneas en una respuesta HTTP, puede ocurrir una inyecci\u00f3n de encabezado.\u0026#xa0;Django en s\u00ed no est\u00e1 afectado porque HttpResponse proh\u00edbe las nuevas l\u00edneas en los encabezados HTTP" } ], "id": "CVE-2021-32052", "lastModified": "2024-11-21T06:06:46.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-06T16:15:07.520", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/06/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0002/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/may/06/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/06/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/may/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-16 15:55
Modified
2024-11-21 02:04
Severity ?
Summary
Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers." }, { "lang": "es", "value": "Django 1.4 anterior a 1.4.13, 1.5 anterior a 1.5.8, 1.6 anterior a 1.6.5 y 1.7 anterior a 1.7b4 no incluye debidamente la cabecera (1) Vary: Cookie o (2) Cache-Control en respuestas, lo que permite a atacantes remotos obtener informaci\u00f3n sensible o envenenar la cach\u00e9 a trav\u00e9s de una solicitud de ciertos navegadores." } ], "id": "CVE-2014-1418", "lastModified": "2024-11-21T02:04:14.533", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-16T15:55:04.597", "references": [ { "source": "security@ubuntu.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@ubuntu.com", "url": "http://secunia.com/advisories/61281" }, { "source": "security@ubuntu.com", "url": "http://ubuntu.com/usn/usn-2212-1" }, { "source": "security@ubuntu.com", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "security@ubuntu.com", "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" }, { "source": "security@ubuntu.com", "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "source": "security@ubuntu.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-2212-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-03-25 14:59
Modified
2024-11-21 02:27
Severity ?
Summary
The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | solaris | 11.2 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | 1.6.3 | |
djangoproject | django | 1.6.4 | |
djangoproject | django | 1.6.5 | |
djangoproject | django | 1.6.6 | |
djangoproject | django | 1.6.7 | |
djangoproject | django | 1.6.8 | |
djangoproject | django | 1.6.9 | |
djangoproject | django | 1.6.10 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7.1 | |
djangoproject | django | 1.7.2 | |
djangoproject | django | 1.7.3 | |
djangoproject | django | 1.7.4 | |
djangoproject | django | 1.7.5 | |
djangoproject | django | 1.7.6 | |
djangoproject | django | 1.8.0 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
fedoraproject | fedora | 22 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B1C288F-326B-497B-B26C-D26E01262DDB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "32DDDBEB-6F2F-4BA9-876D-38D41BA29726", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "61680046-51CD-4217-AC1E-C11265205DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6DAD077F-A239-4021-890E-AD4D9D9A388D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string." }, { "lang": "es", "value": "La funci\u00f3n utils.html.strip_tags en Django 1.6.x anterior a 1.6.11, 1.7.x anterior a 1.7.7, y 1.8.x anterior a 1.8c1, cuando utiliza ciertos versiones de Python, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito) mediante el incremento de la longitud de la cadena de entradas." } ], "id": "CVE-2015-2316", "lastModified": "2024-11-21T02:27:11.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-25T14:59:02.940", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/73322" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2539-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/73322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2539-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-05 00:15
Modified
2024-11-21 06:32
Severity ?
Summary
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E20BDA6F-5744-4B52-B995-529E3A14EF69", "versionEndExcluding": "2.2.26", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E0CB9E7-6BFE-4732-872F-1DE2BFCA9223", "versionEndExcluding": "3.2.11", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAF6F5EA-00FA-4871-A06F-0F6F7DF1D06D", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it." }, { "lang": "es", "value": "El archivo Storage.save en Django versiones 2.2 anteriores a 2.2.26, 3.2 anteriores a 3.2.11 y 4.0 anteriores a 4.0.1, permite un salto de directorio si le es pasado directamente nombres de archivos dise\u00f1ados." } ], "id": "CVE-2021-45452", "lastModified": "2024-11-21T06:32:14.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-05T00:15:07.997", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-16 06:15
Modified
2024-11-21 07:23
Severity ?
Summary
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AA2CC40-5E6E-4DB2-BBA2-45AB9465C433", "versionEndExcluding": "3.2.16", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0870A9C-4C3E-47C4-B10D-7F11649B3496", "versionEndExcluding": "4.0.8", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "9860080C-1E84-45C0-A27F-EA4C57901563", "versionEndExcluding": "4.1.2", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression." }, { "lang": "es", "value": "En Django versiones 3.2 anteriores a 3.2.16, 4.0 anteriores a 4.0.8, y 4.1 anteriores a 4.1.2, las URLs internacionalizadas estaban sujetas a un potencial ataque de denegaci\u00f3n de servicio por medio del par\u00e1metro locale, que es tratado como una expresi\u00f3n regular" } ], "id": "CVE-2022-41323", "lastModified": "2024-11-21T07:23:02.917", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-16T06:15:09.650", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221124-0001/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221124-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 19:15
Modified
2024-11-21 04:35
Severity ?
Summary
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | 3.0 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 | |
canonical | ubuntu_linux | 19.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "B19BDC93-017C-444E-BE89-E5951564C6F1", "versionEndExcluding": "1.11.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "72FE3431-6956-4197-B0B7-9263888FF1FC", "versionEndExcluding": "2.2.9", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C23D9FE4-31F5-4A23-916E-8EC763886DC9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user\u0027s email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)" }, { "lang": "es", "value": "Django versiones anteriores a 1.11.27, versiones 2.x anteriores a 2.2.9 y versiones 3.x anteriores a 3.0.1, permite tomar el control de la cuenta. Una direcci\u00f3n de correo electr\u00f3nico dise\u00f1ada adecuadamente (que es igual a la direcci\u00f3n de correo electr\u00f3nico de un usuario existente despu\u00e9s de la transformaci\u00f3n de may\u00fasculas y min\u00fasculas de los caracteres Unicode) permitir\u00eda a un atacante enviarle un token de restablecimiento de contrase\u00f1a para la cuenta de usuario coincidente. (Una mitigaci\u00f3n en las nuevas versiones es enviar tokens de restablecimiento de contrase\u00f1a solo a la direcci\u00f3n de correo electr\u00f3nico del usuario registrado)." } ], "id": "CVE-2019-19844", "lastModified": "2024-11-21T04:35:30.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T19:15:11.780", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2020/Jan/9" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20200110-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4224-1/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2020/dsa-4598" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2020/Jan/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200110-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4224-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2020/dsa-4598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-11 13:29
Modified
2024-11-21 04:47
Severity ?
Summary
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
fedoraproject | fedora | 28 | |
fedoraproject | fedora | 29 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E500ADB-2D05-499C-9A7E-0FDA027189DD", "versionEndExcluding": "1.11.19", "versionStartIncluding": "1.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "C54AC983-C1E1-4CD1-8343-50744FE71181", "versionEndExcluding": "2.0.11", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C200A0C-1105-4747-B2C1-A624D80D747D", "versionEndExcluding": "2.1.6", "versionStartIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "matchCriteriaId": "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function." }, { "lang": "es", "value": "Django, en versiones 1.11.x anteriores a la 1.11.19, versiones 2.0.x anteriores a la 2.0.11 y versiones 2.1.x anteriores a la 2.1.6, permite el consumo incontrolado de memoria mediante un valor malicioso proporcionado por el atacante a la funci\u00f3n django.utils.numberformat.format()." } ], "id": "CVE-2019-6975", "lastModified": "2024-11-21T04:47:20.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-11T13:29:00.270", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106964" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3890-1/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2019/dsa-4476" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2019/02/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3890-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2019/02/11/1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | 1.6.3 | |
djangoproject | django | 1.6.4 | |
djangoproject | django | 1.6.5 | |
djangoproject | django | 1.6.6 | |
djangoproject | django | 1.6.7 | |
djangoproject | django | 1.6.8 | |
djangoproject | django | 1.6.9 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7.1 | |
djangoproject | django | 1.7.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E636F6CA-1979-43DA-A12F-23EC009B4A65", "versionEndIncluding": "1.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5463AB51-6088-473A-BB54-BB78ACFC6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "72653EB4-CE19-42FC-9C99-5CB391DABE7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header." }, { "lang": "es", "value": "Django anterior a 1.4.18, 1.6.x anterior a 1.6.10, y 1.7.x anterior a 1.7.3 permite a atacantes remotos falsificar cabeceras WSGI mediante el uso de un caracter _ (gui\u00f3n bajo) en lugar de un caracter - (gui\u00f3n) en una cabecera HTTP, tal y como fue demostrado por una cabecera X-Auth_User." } ], "id": "CVE-2015-0219", "lastModified": "2024-11-21T02:22:34.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-16T16:59:18.657", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62285" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62309" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62718" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2469-1" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2469-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-17" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-10-23 18:22
Severity ?
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.djangoproject.com/en/dev/releases/security/ | Patch, Vendor Advisory | |
cve@mitre.org | https://groups.google.com/forum/#%21forum/django-announce | Not Applicable | |
cve@mitre.org | https://www.djangoproject.com/weblog/2024/aug/06/security-releases/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C38224F-C41B-428C-89C2-603BBA95AD3C", "versionEndExcluding": "4.2.15", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3384B57C-DBF5-4E23-99E7-92B260D53E8E", "versionEndExcluding": "5.0.8", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. Los m\u00e9todos QuerySet.values() y value_list() en modelos con JSONField est\u00e1n sujetos a inyecci\u00f3n SQL en alias de columna a trav\u00e9s de una clave de objeto JSON dise\u00f1ada como un *arg pasado." } ], "id": "CVE-2024-42005", "lastModified": "2024-10-23T18:22:48.937", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-08-07T15:15:56.220", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-03 17:29
Modified
2024-11-21 03:49
Severity ?
Summary
django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 18.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "93F54FB8-94F4-4EFF-BC4F-70AE1A69DBA2", "versionEndExcluding": "1.11.15", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "589C9BE3-5032-4D66-BC99-F46B4B7924C2", "versionEndExcluding": "2.0.8", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*", "matchCriteriaId": "B85E9B9B-ADDB-4D2F-A857-685BD30CE856", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect." }, { "lang": "es", "value": "django.middleware.common.CommonMiddleware en Django en versiones 1.11.x anteriores a la 1.11.15 y versiones 2.0.x anteriores a la 2.0.8 tiene una redirecci\u00f3n abierta." } ], "id": "CVE-2018-14574", "lastModified": "2024-11-21T03:49:20.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-03T17:29:00.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104970" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041403" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3726-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4264" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3726-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-01 13:15
Modified
2024-11-21 05:15
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
oracle | zfs_storage_appliance_kit | 8.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "419C0026-8399-4CEA-AC73-3BCBD26C2FE3", "versionEndExcluding": "2.2.16", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7353206B-6A09-492C-9B8B-67738124D913", "versionEndExcluding": "3.0.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A860912-086E-4556-8636-E50EFC30C3B5", "versionEndExcluding": "3.1.1", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system\u0027s standard umask rather than 0o077." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 2.2 anteriores a 2.2.16, versiones 3.0 anteriores a 3.0.10 y versiones 3.1 anteriores a 3.1.1 (cuando es usado Python 3.7+).\u0026#xa0;Los directorios de nivel intermedio de la cach\u00e9 del sistema de archivos ten\u00edan la umask est\u00e1ndar del sistema en lugar de 0o077" } ], "id": "CVE-2020-24584", "lastModified": "2024-11-21T05:15:03.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-01T13:15:11.197", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-16 19:14
Modified
2024-11-21 01:55
Severity ?
Summary
Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.4.4 | |
djangoproject | django | 1.4.5 | |
djangoproject | django | 1.4.6 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5.1 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag." }, { "lang": "es", "value": "Vulnerabilidad de recorrido de directorios en Django 1.4.x anterior a 1.4.7, 1.5.x anterior a 1.5.3, y 1.6.x anterior a 1.6 beta 3 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de una ruta de fichero en la opci\u00f3n ALLOWED_INCLUDE_ROOTS en una etiqueta de plantilla ssi" } ], "id": "CVE-2013-4315", "lastModified": "2024-11-21T01:55:20.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-16T19:14:39.303", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54772" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54828" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2755" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-08 18:15
Modified
2024-11-21 06:08
Severity ?
Summary
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8BA629-0BE3-443F-A383-04CB1F2E22FC", "versionEndExcluding": "2.2.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0C9108D-FCDC-4B71-8F2A-328CC32C255D", "versionEndExcluding": "3.1.12", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3AB5A-FF13-4123-B759-A2E9F941F540", "versionEndExcluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories." }, { "lang": "es", "value": "Django versiones anteriores a 2.2.24, versiones 3.x anteriores a 3.1.12 y versiones 3.2.x anteriores a 3.2.4, presenta un potencial salto de directorio por medio de django.contrib.admindocs. Los miembros del personal podr\u00edan usar la visualizaci\u00f3n TemplateDetailView para comprobar la existencia de archivos arbitrarios. Adicionalmente, si (y s\u00f3lo si) las plantillas admindocs por defecto han sido personalizadas por los desarrolladores de aplicaciones para mostrar tambi\u00e9n el contenido de los archivos, entonces no s\u00f3lo se habr\u00eda expuesto la existencia sino tambi\u00e9n el contenido de los archivos. En otras palabras, se presenta un salto de directorio fuera de los directorios root de las plantillas" } ], "id": "CVE-2021-33203", "lastModified": "2024-11-21T06:08:30.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-08T18:15:08.480", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-14 21:00
Modified
2024-11-21 01:24
Severity ?
Summary
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
microsoft | windows | * | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 en Windows, cuando est\u00e1 habilitado permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n al utilizar caracteres /(barra) en la llave de una cookie de sesi\u00f3n , relacionada con la repetici\u00f3n de sesiones.\r\n" } ], "id": "CVE-2011-0698", "lastModified": "2024-11-21T01:24:38.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-14T21:00:03.320", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43230" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46296" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0439" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-15 01:15
Modified
2024-11-21 07:48
Severity ?
Summary
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "73D9FA8C-F224-45CC-980F-F7ABD7AB9BA2", "versionEndExcluding": "3.2.18", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "08D34DC1-EA58-44BB-BBC2-B6089E525D59", "versionEndExcluding": "4.0.10", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDF86D1D-0552-4E21-95D2-85D2AE484F9F", "versionEndExcluding": "4.1.7", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Multipart Request Parser de Django 3.2 anterior a 3.2.18, 4.0 anterior a 4.0.10 y 4.1 anterior a 4.1.7. Pasar ciertas entradas (por ejemplo, una cantidad excesiva de partes) a formularios de varias partes podr\u00eda generar demasiados archivos abiertos o agotamiento de la memoria, y proporcionaba un vector potencial para un ataque de denegaci\u00f3n de servicio." } ], "id": "CVE-2023-24580", "lastModified": "2024-11-21T07:48:10.217", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-15T01:15:10.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/02/14/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230316-0006/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/02/14/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20230316-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-08-07 20:48
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.djangoproject.com/en/dev/releases/security/ | Patch, Vendor Advisory | |
cve@mitre.org | https://groups.google.com/forum/#%21forum/django-announce | Not Applicable | |
cve@mitre.org | https://www.djangoproject.com/weblog/2024/aug/06/security-releases/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C38224F-C41B-428C-89C2-603BBA95AD3C", "versionEndExcluding": "4.2.15", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3384B57C-DBF5-4E23-99E7-92B260D53E8E", "versionEndExcluding": "5.0.8", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. Los filtros de plantilla urlize y urlizetrunc, y el widget AdminURLFieldWidget, est\u00e1n sujetos a un posible ataque de denegaci\u00f3n de servicio a trav\u00e9s de ciertas entradas con una gran cantidad de caracteres Unicode." } ], "id": "CVE-2024-41991", "lastModified": "2024-08-07T20:48:22.403", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-08-07T15:15:56.160", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-130" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-05 15:15
Modified
2024-11-21 05:40
Severity ?
Summary
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
netapp | steelstore_cloud_integrated_storage | - | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E0FB31D-8247-46E5-B66D-E2D94C38C5D2", "versionEndExcluding": "1.11.29", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ABDBEB7-8FD6-488D-A715-FBE3908A777B", "versionEndExcluding": "2.2.11", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24A04E9-31B2-4A5F-B5CE-1043D7977CCC", "versionEndExcluding": "3.0.4", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL." }, { "lang": "es", "value": "Django versiones 1.11 anteriores a 1.11.29, versiones 2.2 anteriores a 2.2.11 y versiones 3.0 anteriores a 3.0.4, permite una Inyecci\u00f3n SQL si datos no confiables son usados como un par\u00e1metro tolerance en funciones GIS y agregados en Oracle. Al pasar una tolerancia dise\u00f1ada adecuadamente hacia las funciones GIS y agregarlas en Oracle, esto hizo posible romper el escape e inyectar SQL malicioso." } ], "id": "CVE-2020-9402", "lastModified": "2024-11-21T05:40:33.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-05T15:15:12.410", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4296-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4296-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-14 21:00
Modified
2024-11-21 01:24
Severity ?
Summary
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a \"combination of browser plugins and redirects,\" a related issue to CVE-2011-0447." }, { "lang": "es", "value": "Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 no valida correctamente las solicitudes HTTP que contienen una cabecera X-Requested-With , que facilita a los atacantes remotos para llevar a cabo ataques de vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) , permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores mediante peticiones AJAX manipuladas que aprovechan una \"combinaci\u00f3n de complementos del navegador y redirecciones, esta vulnerabilidad esta relacionada con CVE-2011-0447." } ], "id": "CVE-2011-0696", "lastModified": "2024-11-21T01:24:38.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-14T21:00:03.210", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43230" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43297" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43382" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43426" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2163" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46296" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676357" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-31 17:55
Modified
2024-11-21 01:40
Severity ?
Summary
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.1.4 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2-alpha1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.2.6 | |
djangoproject | django | 1.2.7 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "225CA836-30A5-45C2-8AF2-F11D95170303", "versionEndIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "E670BDE4-85E8-472F-B639-CB4CA53070A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "A6508CE5-0556-4889-9380-B6B06B79F515", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*", "matchCriteriaId": "1EEC80B3-36F1-48C7-A4C0-2144613E7C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "D827F8B8-60D5-443C-B8B6-AAFE7122DB96", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*", "matchCriteriaId": "CE5C74F9-41EB-4D29-BB68-A2C6F5E6FF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "F1694141-3247-46A3-9539-117016A100F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "CE66E695-67CC-418E-930B-F002CFDDA3E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "573ACC2E-1FAA-4609-8372-8C1A94C136A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "D7B67974-4584-411B-90BB-2D7BF06A8F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "89E29453-349B-4A50-8C8A-36550AFB6771", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*", "matchCriteriaId": "476CDAAC-84F9-42F8-BABC-121AD9674B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "19959A8A-7FF9-4318-803D-5CD9F866F795", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "9696406B-76A8-40C8-BD92-0A7ACBB53354", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "33D378F8-CFDC-4882-A838-406ABA7AD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file." }, { "lang": "es", "value": "La clase django.forms.ImageField en el sistema de formularios en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 descomprime completamente los datos de la imagen durante la validaci\u00f3n de la misma, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) mediante la subida de una imagen." } ], "id": "CVE-2012-3443", "lastModified": "2024-11-21T01:40:53.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-31T17:55:04.577", "references": [ { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2529" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-14 21:00
Modified
2024-11-21 01:24
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload." }, { "lang": "es", "value": "Vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Django v1.1.x anteriores a v1.1.4 y v1.2.x anteriores a v1.2.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del nombre de fichero vinculado a la subida de un archivo.\r\n" } ], "id": "CVE-2011-0697", "lastModified": "2024-11-21T01:24:38.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-14T21:00:03.273", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43230" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43297" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43382" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43426" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2163" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46296" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/02/09/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2011/feb/08/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1066-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676359" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:47
Severity ?
Summary
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 35 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7324BB5-64C7-45F6-ADEB-E0929B4B00B6", "versionEndExcluding": "2.2.27", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB946-FCF5-43FC-99EF-EBB2513CA2FB", "versionEndExcluding": "3.2.12", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA09D497-21DD-410D-9692-A601B1EAA0B9", "versionEndExcluding": "4.0.2", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS." }, { "lang": "es", "value": "La etiqueta de plantilla {% debug %} en Django versiones 2.2 anteriores a 2.2.27, 3.2 anteriores a 3.2.12 y 4.0 anteriores a 4.0.2, no codifica correctamente el contexto actual. Esto puede conllevar a un ataque de tipo XSS" } ], "id": "CVE-2022-22818", "lastModified": "2024-11-21T06:47:30.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:07.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-31 17:55
Modified
2024-11-21 01:40
Severity ?
Summary
The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.1.4 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2-alpha1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.2.6 | |
djangoproject | django | 1.2.7 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "225CA836-30A5-45C2-8AF2-F11D95170303", "versionEndIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "E670BDE4-85E8-472F-B639-CB4CA53070A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "A6508CE5-0556-4889-9380-B6B06B79F515", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*", "matchCriteriaId": "1EEC80B3-36F1-48C7-A4C0-2144613E7C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "D827F8B8-60D5-443C-B8B6-AAFE7122DB96", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*", "matchCriteriaId": "CE5C74F9-41EB-4D29-BB68-A2C6F5E6FF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "F1694141-3247-46A3-9539-117016A100F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "CE66E695-67CC-418E-930B-F002CFDDA3E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "573ACC2E-1FAA-4609-8372-8C1A94C136A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "D7B67974-4584-411B-90BB-2D7BF06A8F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "89E29453-349B-4A50-8C8A-36550AFB6771", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*", "matchCriteriaId": "476CDAAC-84F9-42F8-BABC-121AD9674B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "19959A8A-7FF9-4318-803D-5CD9F866F795", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "9696406B-76A8-40C8-BD92-0A7ACBB53354", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "33D378F8-CFDC-4882-A838-406ABA7AD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL." }, { "lang": "es", "value": "Las clases (1) django.http.HttpResponseRedirect y (2) django.http.HttpResponsePermanentRedirect en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 no validan el esquema de un destino dredireccionado, lo que podr\u00eda permitir a atacantes remotos conducir un ataque de secuencias de comandos en sitios cruzados (XSS) a trav\u00e9s de un dato: URL." } ], "id": "CVE-2012-3442", "lastModified": "2024-11-21T01:40:53.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-07-31T17:55:01.607", "references": [ { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2529" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-03-25 14:59
Modified
2024-11-21 02:27
Severity ?
Summary
The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "94432CC2-A802-43D2-A571-1C5BA64F735A", "versionEndIncluding": "1.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFC18F77-77CB-45CB-869E-267DACD19601", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "0B3937A5-D537-4A9A-B7EF-0F7C441EE520", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "5B63ECA8-0AD0-4670-B026-6762DCC65D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB39F768-9616-4C56-9613-55A5229DDCA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "9074F301-7595-464A-8DE5-41E78E5EE804", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "32DDDBEB-6F2F-4BA9-876D-38D41BA29726", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "61680046-51CD-4217-AC1E-C11265205DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6DAD077F-A239-4021-890E-AD4D9D9A388D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B1C288F-326B-497B-B26C-D26E01262DDB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \\x08javascript: URL." }, { "lang": "es", "value": "La funci\u00f3n utils.http.is_safe_url en Django anterior a 1.4.20, 1.5.x, 1.6.x anterior a 1.6.11, 1.7.x anterior a 1.7.7, y 1.8.x anterior a 1.8c1 no valida correctamente las URLs, lo que permite a atacantes remotos realizar ataques de XSS a trav\u00e9s de un caracter de control en una URL, tal y como fue demostrado por una URL \\x08javascript." } ], "id": "CVE-2015-2317", "lastModified": "2024-11-21T02:27:12.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-03-25T14:59:04.377", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://ubuntu.com/usn/usn-2539-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3204" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/73319" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://ubuntu.com/usn/usn-2539-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/73319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-07 20:59
Modified
2024-11-21 02:38
Severity ?
Summary
The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 1.8.0 | |
djangoproject | django | 1.8.1 | |
djangoproject | django | 1.8.2 | |
djangoproject | django | 1.8.3 | |
djangoproject | django | 1.8.4 | |
djangoproject | django | 1.8.5 | |
djangoproject | django | 1.8.6 | |
djangoproject | django | 1.9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD6D743-BCFB-49E9-A287-8E36E6E619D6", "versionEndIncluding": "1.7.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "63D36984-4C8E-4CDB-8D15-445705FCECF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B324AE6-ADD8-41B9-B250-A6577ACBB364", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6487058-6768-4AD3-BE27-A0B3D1ACFC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CFF0538-B111-44A8-ADC2-87E280186257", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "832F9FA9-5FC8-4DB6-AD39-C3D1C21C4568", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY." }, { "lang": "es", "value": "La funci\u00f3n get_format en utils/formats.py en Django en versiones anteriores a 1.7.x en versiones anteriores a 1.7.11, 1.8.x en versiones anteriores a 1.8.7 y 1.9.x en versiones anteriores a 1.9rc2 puede permitir a atacantes remotos obtener secretos sensibles de aplicaciones a trav\u00e9s de una clave de ajustes en lugar de un ajuste de formato de fecha/hora, seg\u00fan lo demostrado por SECRET_KEY." } ], "id": "CVE-2015-8213", "lastModified": "2024-11-21T02:38:05.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-12-07T20:59:17.613", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0129.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0156.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0157.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0158.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3404" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/77750" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1034237" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2816-1" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0129.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0156.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0157.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0158.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/77750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2816-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-24 14:59
Modified
2024-11-21 02:34
Severity ?
Summary
The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "10CE2864-1EF6-4197-9D1F-051497F1CC5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "ED485DA4-0614-4788-B278-5F1F43F5A579", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "1C3B4B46-383E-498C-8EFD-8C3FB1F494B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "1E1359DE-835F-4748-95F4-D2990DBF6A8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "DE466393-EE2B-44AD-8C69-D4C34A773FFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "B3C103B6-2FB6-4BF5-B88C-A68DEBABBBCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "32DDDBEB-6F2F-4BA9-876D-38D41BA29726", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "61680046-51CD-4217-AC1E-C11265205DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6DAD077F-A239-4021-890E-AD4D9D9A388D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2DCD8E1-EF0F-4878-8952-E0F729A524C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3CB49AF-2A89-4277-B2E9-67803A395A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "63D36984-4C8E-4CDB-8D15-445705FCECF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad en las funciones (1) contrib.sessions.backends.base.SessionBase.flush y (2) cache_db.SessionStore.flush en Django 1.7.x en versiones anteriores a 1.7.10, 1.4.x en versiones anteriores a 1.4.22 y posiblemente en otras versiones, crea sesiones vac\u00edas en ciertas circunstancias, que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de almac\u00e9n de sesi\u00f3n) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-5964", "lastModified": "2024-11-21T02:34:13.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-24T14:59:09.837", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3338" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/76440" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1033318" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-05 00:15
Modified
2024-11-21 06:31
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E20BDA6F-5744-4B52-B995-529E3A14EF69", "versionEndExcluding": "2.2.26", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E0CB9E7-6BFE-4732-872F-1DE2BFCA9223", "versionEndExcluding": "3.2.11", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAF6F5EA-00FA-4871-A06F-0F6F7DF1D06D", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack." }, { "lang": "es", "value": "Se ha detectado un problema en Django versiones 2.2 anteriores a 2.2.26, 3.2 anteriores a 3.2.11 y 4.0 anteriores a 4.0.1. UserAttributeSimilarityValidator incurr\u00eda en una sobrecarga significativa al evaluar una contrase\u00f1a enviada que era artificialmente grande en relaci\u00f3n con los valores de comparaci\u00f3n. En una situaci\u00f3n en la que el acceso al registro de usuarios no estaba restringido, esto proporcionaba un vector potencial para un ataque de denegaci\u00f3n de servicio." } ], "id": "CVE-2021-45115", "lastModified": "2024-11-21T06:31:59.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-05T00:15:07.907", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-10 20:00
Modified
2024-11-21 01:21
Severity ?
Summary
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.91 | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.95.1 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3216CF3F-DC3B-41E5-AAEF-6E6939E4F219", "versionEndIncluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "C40AD94B-AC89-4404-973F-5E60468D06EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A952FB-3A74-4A39-8870-1F37059C9D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*", "matchCriteriaId": "AF1504F2-968F-4E1A-A143-BE494E658DF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter." }, { "lang": "es", "value": "El interfaz de administraci\u00f3n de django.contrib.admin de Django en versiones anteriores a 1.1.3, 1.2.x anteriores a 1.2.4, y 1.3.x anteriores a 1.3 beta 1 no restringen apropiadamente el uso de la cadena de consulta para realizar filtrado de objetos. Lo que permite a usuarios autenticados remotos obtener informaci\u00f3n confidencial a trav\u00e9s de peticiones que contengan expresiones regulares, como se ha demostrado con el par\u00e1metro created_by__password__regex." } ], "id": "CVE-2010-4534", "lastModified": "2024-11-21T01:21:09.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-10T20:00:16.877", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://code.djangoproject.com/changeset/15031" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42715" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42827" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42913" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/515446" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45562" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.djangoproject.com/changeset/15031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/515446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-08 00:15
Modified
2024-11-21 06:30
Severity ?
Summary
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
redhat | satellite | 6.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
canonical | ubuntu_linux | 20.04 | |
canonical | ubuntu_linux | 21.04 | |
canonical | ubuntu_linux | 21.10 | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7C337EB-B7FF-4216-912B-26FB003D8667", "versionEndExcluding": "2.2.25", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2071B42-6E34-494E-B49F-72058E5C8AC0", "versionEndExcluding": "3.1.14", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "C67D250D-03D7-40AA-9DFD-E86F5167057F", "versionEndExcluding": "3.2.10", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:satellite:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "500C9E01-3373-43EA-AA9B-862B0DD87C6D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*", "matchCriteriaId": "8EF1C1CC-3FAE-4DE3-BC41-E5B14D5721F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*", "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths." }, { "lang": "es", "value": "En Django versiones 2.2 anteriores a 2.2.25, versiones 3.1 anteriores a 3.1.14, y versiones 3.2 anteriores a 3.2.10, las peticiones HTTP para URLs con l\u00edneas nuevas al final pod\u00edan omitir el control de acceso de la corriente principal basado en las rutas de las URLs" } ], "id": "CVE-2021-44420", "lastModified": "2024-11-21T06:30:56.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-08T00:15:07.757", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211229-0006/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/12/07/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211229-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/12/07/1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-08 16:15
Modified
2024-10-30 17:35
Severity ?
Summary
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.djangoproject.com/en/dev/releases/security/ | Vendor Advisory | |
cve@mitre.org | https://groups.google.com/forum/#%21forum/django-announce | Permissions Required | |
cve@mitre.org | https://www.djangoproject.com/weblog/2024/sep/03/security-releases/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | 5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E9063-064F-4C6E-9985-7A049D38D299", "versionEndExcluding": "4.2.16", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3803EA-9D53-4E0B-A8E2-CB90D9677E75", "versionEndExcluding": "5.0.9", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A1AE023-D9C3-4D36-B17F-7F6F24E59EF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing)." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django v5.1.1, v5.0.9 y v4.2.16. La clase django.contrib.auth.forms.PasswordResetForm, cuando se utiliza en una vista que implementa flujos de restablecimiento de contrase\u00f1a, permite a atacantes remotos enumerar las direcciones de correo electr\u00f3nico de los usuarios mediante el env\u00edo de solicitudes de restablecimiento de contrase\u00f1a y la observaci\u00f3n del resultado (solo cuando el env\u00edo de correo electr\u00f3nico falla constantemente)." } ], "id": "CVE-2024-45231", "lastModified": "2024-10-30T17:35:10.147", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-08T16:15:11.997", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-08 16:15
Modified
2024-10-30 17:35
Severity ?
Summary
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.djangoproject.com/en/dev/releases/security/ | Vendor Advisory | |
cve@mitre.org | https://groups.google.com/forum/#%21forum/django-announce | Permissions Required | |
cve@mitre.org | https://www.djangoproject.com/weblog/2024/sep/03/security-releases/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | 5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E9063-064F-4C6E-9985-7A049D38D299", "versionEndExcluding": "4.2.16", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3803EA-9D53-4E0B-A8E2-CB90D9677E75", "versionEndExcluding": "5.0.9", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A1AE023-D9C3-4D36-B17F-7F6F24E59EF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 5.1 anterior a 5.1.1, 5.0 anterior a 5.0.9 y 4.2 anterior a 4.2.16. Los filtros de plantilla urlize() y urlizetrunc() est\u00e1n sujetos a un posible ataque de denegaci\u00f3n de servicio mediante entradas muy grandes con una secuencia espec\u00edfica de caracteres." } ], "id": "CVE-2024-45230", "lastModified": "2024-10-30T17:35:09.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-08T16:15:11.903", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2016-12-09 20:59
Modified
2024-11-21 03:00
Severity ?
Summary
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "matchCriteriaId": "772E9557-A371-4664-AE2D-4135AAEB89AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*", "matchCriteriaId": "1AFB20FA-CB00-4729-AB3A-816454C6D096", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "6BCCB794-1F30-4FC2-A63A-BCE7539BE5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "63D36984-4C8E-4CDB-8D15-445705FCECF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B324AE6-ADD8-41B9-B250-A6577ACBB364", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6487058-6768-4AD3-BE27-A0B3D1ACFC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CFF0538-B111-44A8-ADC2-87E280186257", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "C3343FF8-53EC-459D-B31C-CD363D04FF42", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "B9B637E9-067A-4473-9B50-433CCC177982", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "99A5BF6D-631B-4C8E-9868-579BD79100C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "280B9958-9163-4126-910A-2EF4B408DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "6A40373B-301E-4B81-8FA5-28D916142F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "79BB3174-7859-4195-B7B3-BCAA280A6F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "42EF41AF-B2FA-468A-B161-D9FE29CE53EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "48DF0100-F98E-4997-A8F7-DC07FA4A06D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "ECDC5647-8EA7-4595-88C2-541BC489ED2D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE21DA5F-C086-4E98-A5DD-2B96731B56D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CE31960-7C68-42F3-B215-B30A87DB67CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A18691A7-E4D0-48A4-81A7-89846E991AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C06EBD9-381E-4018-BFDC-E23EA18097B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7D134048-B64F-45AE-B4A2-26E516CCF37B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "64A4030E-F51F-4944-BCE7-E27CD32EC7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "CCC1F046-DAF7-4734-9F80-A3C57857AF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "61EE8536-0E8D-477A-B8EA-817CE21D516A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "483D0F44-15C8-43A2-B3AE-331F40DA1A80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS." }, { "lang": "es", "value": "Django en versiones anteriores a 1.8.x en versiones anteriores a 1.8.16, 1.9.x en versiones anteriores a 1.9.11 y 1.10.x en versiones anteriores a 1.10.3 cuando settings.DEBUG es True, permiten a atacantes remotos llevar a cabo ataques de revinculaci\u00f3n DNS aprovechando el fallo para validar la cabecera del Host HTTP contra settings.ALLOWED_HOSTS." } ], "id": "CVE-2016-9014", "lastModified": "2024-11-21T03:00:26.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-09T20:59:06.970", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94068" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037159" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-08 18:15
Modified
2024-11-21 06:09
Severity ?
Summary
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD5CCAE9-4A03-4C54-9278-BBA06A1C9ECF", "versionEndExcluding": "2.2.24", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "0895A526-5861-47FC-91AC-8F78387E464A", "versionEndExcluding": "3.1.12", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "FACCFD9B-3783-4065-8F52-686D20149AAF", "versionEndExcluding": "3.2.4", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) ." }, { "lang": "es", "value": "En Django versiones 2.2 anteriores a 2.2.24, versiones 3.x anteriores a 3.1.12 y versiones 3.2 anteriores a 3.2.4, las funciones URLValidator, validate_ipv4_address y validate_ipv46_address no proh\u00edben los caracteres cero a la izquierda en los literales octales. Esto puede permitir una omisi\u00f3n del control de acceso basado en las direcciones IP. (validate_ipv4_address y validate_ipv46_address no se ven afectados con Python versi\u00f3n 3.9.5+)" } ], "id": "CVE-2021-33571", "lastModified": "2024-11-21T06:09:06.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-08T18:15:08.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-01 14:15
Modified
2024-11-21 04:23
Severity ?
Summary
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
canonical | ubuntu_linux | 19.04 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC20F94C-6807-48BE-A1BB-EADF99C75889", "versionEndExcluding": "1.11.22", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "21F4A0E0-8305-45B7-9C3A-606E17312A59", "versionEndExcluding": "2.1.10", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "984DDB9B-4102-4A5F-A135-4ACF913BA03B", "versionEndExcluding": "2.2.3", "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP." }, { "lang": "es", "value": "Se ha descubierto un problema en Django en versiones 1.11 anteriores a la 1.11.22, 2.1, anteriores a la 2.1.10, y 2.2 anteriores 2.2.3. Una petici\u00f3n HTTP no se redirige a HTTPS cuando se usan las configuraciones SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT, y el proxy se conecta a Django a trav\u00e9s de HTTPS. En otras palabras, django.http.HttpRequest.scheme tiene un comportamiento incorrecto cuando un cliente usa HTTP." } ], "id": "CVE-2019-12781", "lastModified": "2024-11-21T04:23:33.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-01T14:15:10.847", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/01/3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/109018" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190705-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4043-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/01/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/109018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190705-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4043-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-09 13:15
Modified
2024-11-21 04:26
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 30 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49BD116-09A6-454E-BB68-65FCDE06DF33", "versionEndExcluding": "1.11.23", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D05096B-F60E-4DB2-AE59-EED55F945AB0", "versionEndExcluding": "2.1.11", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B", "versionEndExcluding": "2.2.4", "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of \"OR 1=1\" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a 2.1.11 y versiones 2.2.x anteriores a 2.2.4. Debido a un error en la transformaci\u00f3n de clave superficial, las b\u00fasquedas de clave e \u00edndice para django.contrib.postgres.fields.JSONField, y las b\u00fasquedas de clave para django.contrib.postgres.fields.HStoreField, estaban sujetas a una inyecci\u00f3n SQL. Esto podr\u00eda, por ejemplo, ser explotado mediante el uso de un \"OR 1 = 1\" dise\u00f1ado en una clave o nombre de \u00edndice para devolver todos los registros, utilizando un diccionario cuidadosamente dise\u00f1ado, con expansi\u00f3n de diccionario, como los **kwargs pasados a la funci\u00f3n QuerySet.filter()." } ], "id": "CVE-2019-14234", "lastModified": "2024-11-21T04:26:15.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-09T13:15:11.777", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-12-09 20:59
Modified
2024-11-21 03:00
Severity ?
Summary
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE21DA5F-C086-4E98-A5DD-2B96731B56D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CE31960-7C68-42F3-B215-B30A87DB67CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*", "matchCriteriaId": "1AFB20FA-CB00-4729-AB3A-816454C6D096", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A18691A7-E4D0-48A4-81A7-89846E991AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C06EBD9-381E-4018-BFDC-E23EA18097B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7D134048-B64F-45AE-B4A2-26E516CCF37B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "64A4030E-F51F-4944-BCE7-E27CD32EC7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "CCC1F046-DAF7-4734-9F80-A3C57857AF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "61EE8536-0E8D-477A-B8EA-817CE21D516A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "483D0F44-15C8-43A2-B3AE-331F40DA1A80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "6BCCB794-1F30-4FC2-A63A-BCE7539BE5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "63D36984-4C8E-4CDB-8D15-445705FCECF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B324AE6-ADD8-41B9-B250-A6577ACBB364", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6487058-6768-4AD3-BE27-A0B3D1ACFC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CFF0538-B111-44A8-ADC2-87E280186257", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "C3343FF8-53EC-459D-B31C-CD363D04FF42", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "B9B637E9-067A-4473-9B50-433CCC177982", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "99A5BF6D-631B-4C8E-9868-579BD79100C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "280B9958-9163-4126-910A-2EF4B408DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "6A40373B-301E-4B81-8FA5-28D916142F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "79BB3174-7859-4195-B7B3-BCAA280A6F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "42EF41AF-B2FA-468A-B161-D9FE29CE53EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "48DF0100-F98E-4997-A8F7-DC07FA4A06D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "ECDC5647-8EA7-4595-88C2-541BC489ED2D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "matchCriteriaId": "772E9557-A371-4664-AE2D-4135AAEB89AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary." }, { "lang": "es", "value": "Django 1.8.x en versiones anteriores a 1.8.16, 1.9.x en versiones anteriores a 1.9.11 y 1.10.x en versiones anteriores a 1.10.3 utiliza una contrase\u00f1a embebida para un usuario de base de datos temporal creada al ejecutar pruebas con una base de datos Oracle, lo que hace m\u00e1s f\u00e1cil a atacantes remotos obtener acceso al servidor de la base de datos aprovechando el fallo para especificar manualmente una contrase\u00f1a en la configuraci\u00f3n del diccionario TEST de la base de datos." } ], "id": "CVE-2016-9013", "lastModified": "2024-11-21T03:00:26.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-09T20:59:05.657", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94069" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037159" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3115-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-08 15:59
Modified
2024-11-21 02:48
Severity ?
Summary
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.8.9 | |
djangoproject | django | 1.9 | |
djangoproject | django | 1.9.1 | |
djangoproject | django | 1.9.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "99A5BF6D-631B-4C8E-9868-579BD79100C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests." }, { "lang": "es", "value": "El hasher de contrase\u00f1as en contrib/auth/hashers.py en Django en versiones anteriores a 1.8.10 y 1.9.x en versiones anteriores a 1.9.3 permite a atacantes remotos enumerar usuarios a trav\u00e9s de un ataque de sincronizaci\u00f3n que implica peticiones de login." } ], "id": "CVE-2016-2513", "lastModified": "2024-11-21T02:48:35.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-08T15:59:07.230", "references": [ { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3544" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/83878" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1035152" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/83878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-12 05:15
Modified
2024-11-21 06:57
Severity ?
Summary
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A545BDF6-D358-44FB-8FF7-5D0166DC6B9B", "versionEndExcluding": "2.2.28", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED1BF93-9E2C-457C-9596-F946FE223BAD", "versionEndExcluding": "3.2.13", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "36239F45-F5DF-4014-A2D0-F691D749C4CF", "versionEndExcluding": "4.0.4", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name." }, { "lang": "es", "value": "Se ha detectado un problema de inyecci\u00f3n SQL en la funci\u00f3n QuerySet.explain() en Django versiones 2.2 anteriores a 2.2.28, 3.2 anteriores a 3.2.13 y 4.0 anteriores a 4.0.4. Esto ocurre al pasar un diccionario dise\u00f1ado (con expansi\u00f3n de diccionario) como el argumento **options, y colocar una carga \u00fatil de inyecci\u00f3n en un nombre de opci\u00f3n" } ], "id": "CVE-2022-28347", "lastModified": "2024-11-21T06:57:11.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-12T05:15:07.357", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-02 06:15
Modified
2024-11-21 08:29
Severity ?
Summary
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "9909EFAF-C1C8-49FA-860F-C2430EC5304D", "versionEndExcluding": "3.2.23", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ED58B2B-B564-4EE4-AE69-1E206AE34B65", "versionEndExcluding": "4.1.13", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A76F97FB-F751-4E8A-B4CD-43ECEA9528CE", "versionEndExcluding": "4.2.7", "versionStartIncluding": "4.2.", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 3.2 anterior a 3.2.23, 4.1 anterior a 4.1.13 y 4.2 anterior a 4.2.7. La normalizaci\u00f3n de NFKC es lenta en Windows. Como consecuencia, django.contrib.auth.forms.UsernameField est\u00e1 sujeto a un potencial ataque DoS (denegaci\u00f3n de servicio) a trav\u00e9s de ciertas entradas con una gran cantidad de caracteres Unicode." } ], "id": "CVE-2023-46695", "lastModified": "2024-11-21T08:29:05.987", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-02T06:15:08.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20231214-0001/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20231214-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-05 15:15
Modified
2024-11-21 06:05
Severity ?
Summary
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 9.0 | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "13443AFD-6FA0-487D-8C84-068829D44AD0", "versionEndExcluding": "2.2.21", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90DC9B2-CDD1-41E6-8745-29CDFE00CE1A", "versionEndExcluding": "3.1.9", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "B014E657-30B7-4174-BAF4-F7C92435900A", "versionEndExcluding": "3.2.1", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names." }, { "lang": "es", "value": "En Django versiones 2.2 anteriores a 2.2.21, versiones 3.1 anteriores a 3.1.9 y versiones 3.2 anteriores a 3.2.1, MultiPartParser, UploadedFile y FieldFile, permit\u00edan un salto de directorio por medio de archivos cargados con nombres de archivo cuidadosamente dise\u00f1ados" } ], "id": "CVE-2021-31542", "lastModified": "2024-11-21T06:05:52.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-05T15:15:08.483", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/04/3" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210618-0001/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/may/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/04/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210618-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/may/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-08-08 20:35
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.djangoproject.com/en/dev/releases/security/ | Patch, Vendor Advisory | |
cve@mitre.org | https://groups.google.com/forum/#%21forum/django-announce | Not Applicable | |
cve@mitre.org | https://www.djangoproject.com/weblog/2024/aug/06/security-releases/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C38224F-C41B-428C-89C2-603BBA95AD3C", "versionEndExcluding": "4.2.15", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3384B57C-DBF5-4E23-99E7-92B260D53E8E", "versionEndExcluding": "5.0.8", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. El filtro de plantilla de formato flotante est\u00e1 sujeto a un consumo de memoria significativo cuando se le proporciona una representaci\u00f3n de cadena de un n\u00famero en notaci\u00f3n cient\u00edfica con un exponente grande." } ], "id": "CVE-2024-41989", "lastModified": "2024-08-08T20:35:11.140", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-08-07T15:15:56.030", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-03-12 14:59
Modified
2024-11-21 02:27
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 1.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ECFF958-872F-4EC8-B5B2-9C0988E55D42", "versionEndIncluding": "1.7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la funci\u00f3n de contenidos en admin/helpers.py en Django anterior a 1.7.6 y 1.8 anterior a 1.8b2 permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s de un atributo de modelo en ModelAdmin.readonly_fields, tal y como fue demostrado por un @property." } ], "id": "CVE-2015-2241", "lastModified": "2024-11-21T02:27:03.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-03-12T14:59:05.870", "references": [ { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/73095" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://code.djangoproject.com/ticket/24461" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/73095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://code.djangoproject.com/ticket/24461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-02 18:29
Modified
2024-11-21 03:53
Severity ?
Summary
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securitytracker.com/id/1041749 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20190502-0009/ | Third Party Advisory | |
cve@mitre.org | https://www.djangoproject.com/weblog/2018/oct/01/security-release/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041749 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190502-0009/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.djangoproject.com/weblog/2018/oct/01/security-release/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62D06FC-9AAD-41BF-9A40-2800A0ECCAFB", "versionEndExcluding": "2.1.2", "versionStartIncluding": "2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the \"view\" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes." }, { "lang": "es", "value": "Se ha descubierto un problema en Django, en versiones 2.1 anteriores a la 2.1.2, por el cual los usuarios no privilegiados pueden leer los hashes de contrase\u00f1a de cuentas arbitrarias. El widget de contrase\u00f1a de solo lectura empleada por el administrador de Django para mostrar un hash de contrase\u00f1a ofuscada se omit\u00eda si un usuario ten\u00eda solo el permiso \"view\" (nuevo en Django 2.1), lo que resultaba en que el hash de contrase\u00f1a completo se mostraba a esos usuarios. Esto podr\u00eda resultar en una vulnerabilidad para sitios en los que las cuentas de usuario heredadas emplean hashes inseguros." } ], "id": "CVE-2018-16984", "lastModified": "2024-11-21T03:53:39.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-02T18:29:01.430", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041749" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190502-0009/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/oct/01/security-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190502-0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/oct/01/security-release/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-16 15:55
Modified
2024-11-21 02:08
Severity ?
Summary
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by \"http:\\\\\\djangoproject.com.\"" }, { "lang": "es", "value": "La funci\u00f3n django.util.http.is_safe_url en Django 1.4 anterior a 1.4.13, 1.5 anterior a 1.5.8, 1.6 anterior a 1.6.5 y 1.7 anterior a 1.7b4 no valida debidamente URLs, lo que permite a atacantes remotos realizar ataques de redirecci\u00f3n abierta a trav\u00e9s de una URL malformada, tal y como fue demostrado por \u0027http:\\\\\\djangoproject.com.\u0027" } ], "id": "CVE-2014-3730", "lastModified": "2024-11-21T02:08:44.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-05-16T15:55:05.440", "references": [ { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://ubuntu.com/usn/usn-2212-1" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67410" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://ubuntu.com/usn/usn-2212-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/14/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/15/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-23 20:55
Modified
2024-11-21 01:49
Severity ?
Summary
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.4.4 | |
djangoproject | django | 1.4.5 | |
djangoproject | django | 1.4.6 | |
djangoproject | django | 1.4.7 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5.1 | |
djangoproject | django | 1.5.2 | |
djangoproject | django | 1.5.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed." }, { "lang": "es", "value": "El framework de autenticaci\u00f3n (django.contrib.auth) en Django 1.4.x anteriores a 1.4.8, 1.5.x anteriores a 1.5.4, y 1.6.x anteriores a 1.6 beta 4 permite a atacantes remotos causar denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de una contrase\u00f1a larga al ser luego procesada por una funci\u00f3n de resumen (hashed)." } ], "id": "CVE-2013-1443", "lastModified": "2024-11-21T01:49:35.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-23T20:55:07.260", "references": [ { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html" }, { "source": "security@debian.org", "url": "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2013/dsa-2758" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/sep/15/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/sep/15/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-14 17:59
Modified
2024-11-21 02:32
Severity ?
Summary
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "DE466393-EE2B-44AD-8C69-D4C34A773FFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFC18F77-77CB-45CB-869E-267DACD19601", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "0B3937A5-D537-4A9A-B7EF-0F7C441EE520", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "5B63ECA8-0AD0-4670-B026-6762DCC65D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB39F768-9616-4C56-9613-55A5229DDCA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "9074F301-7595-464A-8DE5-41E78E5EE804", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "32DDDBEB-6F2F-4BA9-876D-38D41BA29726", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "61680046-51CD-4217-AC1E-C11265205DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6DAD077F-A239-4021-890E-AD4D9D9A388D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2DCD8E1-EF0F-4878-8952-E0F729A524C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3CB49AF-2A89-4277-B2E9-67803A395A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys." }, { "lang": "es", "value": "La sesi\u00f3n Backend en Django anteriores a 1.4.21, de 1.5.x hasta 1.6.x, 1.7.x anteriores a 1.7.9 y 1.8.x anteriores a 1.8.3, permite a un atacante causar una denegaci\u00f3n de servicios mediante el consumo de almacenamiento de sesi\u00f3n a trav\u00e9s de m\u00faltiples peticiones con una \u00fanica clave de sesi\u00f3n." } ], "id": "CVE-2015-5143", "lastModified": "2024-11-21T02:32:26.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-14T17:59:06.227", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1678.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1686.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75666" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032820" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201510-06" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1678.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1686.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201510-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-03 12:15
Modified
2024-11-21 05:37
Severity ?
Summary
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "00FE8079-CAF7-494D-BC2A-0B964A883EA6", "versionEndExcluding": "1.11.28", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "4771CEA7-2ECE-4620-98E0-D5F1AA91889C", "versionEndExcluding": "2.2.10", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC272D38-BBBC-4440-A120-C2D60CC42A12", "versionEndExcluding": "3.0.3", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL." }, { "lang": "es", "value": "Django versiones 1.11 anteriores a 1.11.28, versiones 2.2 anteriores a 2.2.10 y versiones 3.0 anteriores a 3.0.3, permite una Inyecci\u00f3n SQL si se usan datos no confiables como un delimitador de StringAgg (por ejemplo, en aplicaciones Django que ofrecen descargas de datos como una serie de filas con un delimitador de columna especificado por el usuario). Al pasar un delimitador apropiadamente dise\u00f1ado a una instancia contrib.postgres.aggregates.StringAgg, fue posible romper el escape e inyectar SQL malicioso." } ], "id": "CVE-2020-7471", "lastModified": "2024-11-21T05:37:12.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-03T12:15:26.993", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2020/Feb/30" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20200221-0006/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4264-1/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2020/dsa-4629" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/02/03/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2020/Feb/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200221-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4264-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2020/dsa-4629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/02/03/1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-09 20:29
Modified
2024-11-21 04:12
Severity ?
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "96EB9D8B-0C33-4380-ACAB-D6E1C5962A34", "versionEndExcluding": "1.8.19", "versionStartIncluding": "1.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A74E078B-62BB-4152-A18D-56CC11C0CF79", "versionEndExcluding": "1.11.11", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9B61A1-0ED0-412E-B8A4-DE09598CC2A9", "versionEndExcluding": "2.0.3", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator\u0027s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable." }, { "lang": "es", "value": "Se ha descubierto un problema en Django, en versiones 2.0 anteriores a la 2.0.3; versiones 1.11 anteriores a la 1.11.11 y versiones 1.8 anteriores a la 1.8.19. Si los m\u00e9todos de django.utils.text.Truncator chars() y words() se pasaban al argumento html=True, eran extremadamente lentos a la hora de evaluar ciertas entradas debido a una vulnerabilidad catastr\u00f3fica de b\u00fasqueda hacia atr\u00e1s en una expresi\u00f3n regular. Los m\u00e9todos chars() y words() se emplean para implementar las plantillas de filtro truncatechars_html y truncatewords_html que, por lo tanto, eran vulnerables." } ], "id": "CVE-2018-7537", "lastModified": "2024-11-21T04:12:19.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-09T20:29:00.660", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103357" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4161" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-185" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-04 17:55
Modified
2024-11-21 01:58
Severity ?
Summary
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.4.4 | |
djangoproject | django | 1.4.5 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5.1 | |
djangoproject | django | 1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL\u0027s scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by \"the login view in django.contrib.auth.views\" and the javascript: scheme." }, { "lang": "es", "value": "La funci\u00f3n is_safe_url en utils/http.py de Django 1.4.x anterior a la versi\u00f3n 1.4.6, 1.5.x anterior a la versi\u00f3n 1.5.2, y 1.6 anterior a beta 2 trata un esquema de URL como seguro incluso si no es HTTP o HTTPS, lo que podr\u00eda permitir XSS u otras vulnerabilidades en aplicaciones Django que usen esta funci\u00f3n, como se ha demostrado con \"la vista de inicio de sesi\u00f3n en django.contrib.auth.views\" y el javascript: scheme." } ], "id": "CVE-2013-6044", "lastModified": "2024-11-21T01:58:40.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-10-04T17:55:10.040", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2013/q3/411" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54476" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2740" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/61777" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1028915" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1521.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q3/369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q3/411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
djangoproject | django | * | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | 1.6.3 | |
djangoproject | django | 1.6.4 | |
djangoproject | django | 1.6.5 | |
djangoproject | django | 1.6.6 | |
djangoproject | django | 1.6.7 | |
djangoproject | django | 1.6.8 | |
djangoproject | django | 1.6.9 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7.1 | |
djangoproject | django | 1.7.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*", "matchCriteriaId": "823E02CA-A145-46C2-BC4C-16DECB060B19", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*", "matchCriteriaId": "E685F933-7C10-49B6-9F4B-89478AF51761", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E636F6CA-1979-43DA-A12F-23EC009B4A65", "versionEndIncluding": "1.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5463AB51-6088-473A-BB54-BB78ACFC6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "72653EB4-CE19-42FC-9C99-5CB391DABE7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \"\\njavascript:\" URL." }, { "lang": "es", "value": "La funci\u00f3n django.util.http.is_safe_url en Django anterior a 1.4.18, 1.6.x anterior a 1.6.10, y 1.7.x anterior a 1.7.3 no maneja correctamente los espacios en blanco l\u00edder, lo que permite a atacantes remotos realizar ataques de XSS a trav\u00e9s de una URL manipulada, relacionado con redirigir URLs, tal y como fue demostrado por una URL \u0027\\njavascript:\u0027." } ], "id": "CVE-2015-0220", "lastModified": "2024-11-21T02:22:34.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-16T16:59:19.563", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62285" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62309" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62718" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-2469-1" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-2469-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.91 | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.95.1 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "96EC0AAD-1199-4CDB-B599-A7959A160CB6", "versionEndIncluding": "1.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "C40AD94B-AC89-4404-973F-5E60468D06EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A952FB-3A74-4A39-8870-1F37059C9D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*", "matchCriteriaId": "F75FE4BB-2C64-404F-9347-25289556BE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*", "matchCriteriaId": "AF1504F2-968F-4E1A-A143-BE494E658DF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521." }, { "lang": "es", "value": "La funcionalidad verify_exists de la implementaci\u00f3n de URLField en Django en versiones anteriores a 1.2.7 y 1.3.x anteriores a 1.3.1 se basa en librer\u00edas Python que tratan de acceder a URLs arbitrarias sin un temporizador, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de todos los recursos) a trav\u00e9s de una URL asociada con (1) una respuesta lenta, (2) una conexi\u00f3n TCP completa sin datos enviados o (3) una gran cantidad de datos de aplicaci\u00f3n. Un problema relacionado con CVE-2011-1521." } ], "id": "CVE-2011-4137", "lastModified": "2024-11-21T01:31:55.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-19T10:55:04.207", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "cve@mitre.org", "url": "http://openwall.com/lists/oss-security/2011/09/15/5" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/46614" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/09/15/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFC18F77-77CB-45CB-869E-267DACD19601", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EA690BD-2FBA-425B-AC6F-046081E21183", "versionEndIncluding": "1.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1\u0026t=password URI." }, { "lang": "es", "value": "La interfaz administrativa (contrib.admin) en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3 no comprueba si un campo representa una relaci\u00f3n entre modelos, lo que permite a usuarios remotos autenticados obtener informaci\u00f3n sensible a trav\u00e9s de un par\u00e1metro to_field en una acci\u00f3n popup en una p\u00e1gina de formularios de cambio de administraci\u00f3n, como fue demostrado por una URI /admin/auth/user/?pop=1\u0026t=password." } ], "id": "CVE-2014-0483", "lastModified": "2024-11-21T02:02:13.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-26T14:55:05.347", "references": [ { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/59782" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61276" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "security@debian.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-02 14:15
Modified
2024-11-21 04:34
Severity ?
Summary
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 31 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28B6AFD-209E-4F73-8186-8D271551DA14", "versionEndExcluding": "2.1.15", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8C7C4A3-6D86-43F3-9E07-B05760C6BC18", "versionEndExcluding": "2.2.8", "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model\u0027s save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)" }, { "lang": "es", "value": "Django versiones 2.1 anteriores a 2.1.15 y versiones 2.2 anteriores a 2.2.8, permite una edici\u00f3n de modelos involuntaria. Un administrador de modelo de Django que despliega modelos relacionados en l\u00ednea, donde el usuario tiene permisos de solo lectura para un modelo principal pero permisos de edici\u00f3n para el modelo en l\u00ednea, ser\u00eda presentado con una IU de edici\u00f3n, que permite peticiones POST, para actualizar el modelo en l\u00ednea. No fue posible editar directamente el modelo principal de solo lectura, pero el m\u00e9todo save() del modelo principal fue llamado, activando posibles efectos secundarios y causando que los manejadores de se\u00f1ales previos y posteriores al guardado sean invocados. (Para resolver esto, el administrador de Django es ajustado para requerir permisos de edici\u00f3n en el modelo principal para que los modelos en l\u00ednea sean editables)." } ], "id": "CVE-2019-19118", "lastModified": "2024-11-21T04:34:13.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-02T14:15:10.880", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/02/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20191217-0003/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/02/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20191217-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.91 | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.95.1 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "96EC0AAD-1199-4CDB-B599-A7959A160CB6", "versionEndIncluding": "1.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "C40AD94B-AC89-4404-973F-5E60468D06EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A952FB-3A74-4A39-8870-1F37059C9D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*", "matchCriteriaId": "F75FE4BB-2C64-404F-9347-25289556BE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*", "matchCriteriaId": "AF1504F2-968F-4E1A-A143-BE494E658DF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session\u0027s identifier." }, { "lang": "es", "value": "django.contrib.sessions en Django v1.2.7 y v1.3.x antereiores a v1.3.1, cuando los datos de sesi\u00f3n se almacena en la cach\u00e9, utiliza el espacio de nombres ra\u00edz de los identificadores de sesi\u00f3n las teclas y los datos de aplicaci\u00f3n, lo que permite a atacantes remotos modificar un sesi\u00f3n mediante la activaci\u00f3n de uso de una clave que es igual al identificador de sesi\u00f3n." } ], "id": "CVE-2011-4136", "lastModified": "2024-11-21T01:31:55.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-19T10:55:03.927", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/46614" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-14 17:59
Modified
2024-11-21 02:32
Severity ?
Summary
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.8.0 | |
djangoproject | django | 1.8.1 | |
djangoproject | django | 1.8.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors." }, { "lang": "es", "value": "validators.URLValidator en Django 1.8.x anteriores a 1.8.3 permite a atacantes causar una denegaci\u00f3n de servicios mediante el consumo de la CPU a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-5145", "lastModified": "2024-11-21T02:32:26.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-14T17:59:08.400", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75691" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032820" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201510-06" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201510-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-15 13:15
Modified
2024-11-21 05:51
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
Summary
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
python | python | * | |
python | python | * | |
python | python | * | |
python | python | * | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
debian | debian_linux | 9.0 | |
netapp | cloud_backup | - | |
netapp | inventory_collect_tool | - | |
netapp | ontap_select_deploy_administration_utility | - | |
netapp | snapcenter | - | |
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
oracle | communications_offline_mediation_controller | 12.0.0.3.0 | |
oracle | communications_pricing_design_center | 12.0.0.3.0 | |
oracle | enterprise_manager_ops_center | 12.4.0.0 | |
oracle | zfs_storage_appliance | 8.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB8842D9-B554-4B83-9E2E-0FAF292E448A", "versionEndExcluding": "3.6.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB52F35-D464-4C26-A253-1B96B2A4921A", "versionEndExcluding": "3.7.10", "versionStartIncluding": "3.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F40C09A-B9FD-40D7-B0A3-89C13DAD040B", "versionEndExcluding": "3.8.8", "versionStartIncluding": "3.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ECC4038-73C0-4AEA-99C2-3CFD7C283ABD", "versionEndExcluding": "3.9.2", "versionStartIncluding": "3.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:inventory_collect_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C13438-3C64-40A6-AA0D-327CB722888D", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7BD0710-9119-4813-B605-AD61E46EC450", "versionEndExcluding": "2.2.19", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "83059A91-A193-402A-966C-852841B3B84A", "versionEndExcluding": "3.0.13", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9318762-F84D-4012-A969-BAD7E7D7BC66", "versionEndExcluding": "3.1.7", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "49ACFC73-A509-4D1C-8FC3-F68F495AB055", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7B49D71-6A31-497A-B6A9-06E84F086E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B095CC03-7077-4A58-AB25-CC5380CDCE5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "18096778-19E1-434F-BD96-A9FBF11A8C81", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter." }, { "lang": "es", "value": "El paquete python/cpython desde versiones 0 y anteriores a 3.6.13, desde versiones 3.7.0 y anteriores a 3.7.10, desde versiones 3.8.0 y anteriores a 3.8.8, desde versiones 3.9.0 y anteriores a 3.9.2, son vulnerables al envenenamiento de cach\u00e9 web por medio de urllib.parse.parse_qsl y urllib.parse.parse_qs usando un vector llamado encubrimiento de par\u00e1metros.\u0026#xa0;Cuando el atacante puede separar los par\u00e1metros de la consulta usando un punto y coma (;), pueden causar una diferencia en la interpretaci\u00f3n de la petici\u00f3n entre el proxy (que se ejecuta con la configuraci\u00f3n predeterminada) y el servidor.\u0026#xa0;Esto puede resultar en que las peticiones maliciosas se almacenen en cach\u00e9 como completamente seguras, ya que el proxy normalmente no ver\u00eda el punto y coma como un separador y, por lo tanto, no lo incluir\u00eda en una clave de cach\u00e9 de un par\u00e1metro sin clave" } ], "id": "CVE-2021-23336", "lastModified": "2024-11-21T05:51:31.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-15T13:15:12.433", "references": [ { "source": "report@snyk.io", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/19/4" }, { "source": "report@snyk.io", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/01/2" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python/cpython/pull/24297" }, { "source": "report@snyk.io", "url": "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E" }, { "source": "report@snyk.io", "url": "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E" }, { "source": "report@snyk.io", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "source": "report@snyk.io", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html" }, { "source": "report@snyk.io", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html" }, { "source": "report@snyk.io", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html" }, { "source": "report@snyk.io", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/" }, { "source": "report@snyk.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202104-04" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210326-0004/" }, { "source": "report@snyk.io", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/19/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python/cpython/pull/24297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202104-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210326-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "report@snyk.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-444" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "1B91DE6A-D759-4B2C-982B-AF036B43798D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EA690BD-2FBA-425B-AC6F-046081E21183", "versionEndIncluding": "1.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFC18F77-77CB-45CB-869E-267DACD19601", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto para el sistema del manejo de la subida de ficheros en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3 utiliza un proceso de la generaci\u00f3n de nombres de ficheros secuencial cuando se sube un fichero con un nombre en conflicto, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU) mediante la descarga de m\u00faltiples ficheros con el mismo nombre." } ], "id": "CVE-2014-0481", "lastModified": "2024-11-21T02:02:13.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-26T14:55:05.250", "references": [ { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/59782" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61276" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-01 13:15
Modified
2024-11-21 05:15
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
oracle | zfs_storage_appliance_kit | 8.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "419C0026-8399-4CEA-AC73-3BCBD26C2FE3", "versionEndExcluding": "2.2.16", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7353206B-6A09-492C-9B8B-67738124D913", "versionEndExcluding": "3.0.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A860912-086E-4556-8636-E50EFC30C3B5", "versionEndExcluding": "3.1.1", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 2.2 anteriores a 2.2.16, versiones 3.0 anteriores a 3.0.10 y versiones 3.1 anteriores a 3.1.1 (cuando es usado Python 3.7+).\u0026#xa0;El modo FILE_UPLOAD_DIRECTORY_PERMISSIONS no fue aplicado a los directorios de nivel intermedio creados en el proceso de carga de archivos.\u0026#xa0;Tampoco se aplic\u00f3 a directorios est\u00e1ticos recopilados de nivel intermedio cuando est\u00e1 usando el comando de administraci\u00f3n collectstatic" } ], "id": "CVE-2020-24583", "lastModified": "2024-11-21T05:15:03.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-01T13:15:11.150", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4479-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/09/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-09-14 19:00
Modified
2024-11-21 01:17
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*", "matchCriteriaId": "F75FE4BB-2C64-404F-9347-25289556BE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Django 1.2.x, en versiones anteriores a la 1.2.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante una cookie csrfmiddlewaretoken (tambi\u00e9n conocida como csrf_token)." } ], "id": "CVE-2010-3082", "lastModified": "2024-11-21T01:17:59.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-09-14T19:00:02.953", "references": [ { "source": "secalert@redhat.com", "url": "http://marc.info/?l=oss-security\u0026m=128403961700444\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2010/sep/08/security-release/" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/43116" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1004-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632239" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=128403961700444\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2010/sep/08/security-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/43116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1004-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-05 03:29
Modified
2024-11-21 04:10
Severity ?
Summary
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securitytracker.com/id/1040422 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://usn.ubuntu.com/3559-1/ | Third Party Advisory | |
cve@mitre.org | https://www.djangoproject.com/weblog/2018/feb/01/security-releases/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040422 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3559-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.djangoproject.com/weblog/2018/feb/01/security-releases/ | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.11.8 | |
djangoproject | django | 1.11.9 | |
djangoproject | django | 2.0 | |
djangoproject | django | 2.0.1 | |
canonical | ubuntu_linux | 17.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.11.8:*:*:*:*:*:*:*", "matchCriteriaId": "F8960615-7A77-4220-96C9-D4D6DAB0262A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.11.9:*:*:*:*:*:*:*", "matchCriteriaId": "53095DC2-1819-4AA1-B70A-FEC2EE8178BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2E24D7F-53EC-40D3-BEB9-0EB24FD676F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF6EB5B5-528E-4E91-98FE-CBF882C06B95", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive." }, { "lang": "es", "value": "django.contrib.auth.forms.AuthenticationForm en Django 2.0 anterior a 2.0.2 y 1.11.8 y 1.11.9 permte que atacantes remotos obtengan informaci\u00f3n potencialmente sensible aprovechando la exposici\u00f3n de datos del m\u00e9todo confirm_login_allowed(), tal y como se demuestra al descubrir si una cuenta de usuario est\u00e1 activa o no." } ], "id": "CVE-2018-6188", "lastModified": "2024-11-21T04:10:15.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-05T03:29:00.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040422" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3559-1/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3559-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-08 15:59
Modified
2024-11-21 02:48
Severity ?
Summary
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.8.9 | |
djangoproject | django | 1.9 | |
djangoproject | django | 1.9.1 | |
djangoproject | django | 1.9.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "99A5BF6D-631B-4C8E-9868-579BD79100C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\\@attacker.com." }, { "lang": "es", "value": "La funci\u00f3n utils.http.is_safe_url en Django en versiones anteriores a 1.8.10 y 1.9.x en versiones anteriores a 1.9.3 permite a atacantes remotos redirigir a usuarios a p\u00e1ginas web arbitrarias y llevar a cabo ataques de phishing o posiblemente llevar a cabo ataques de XSS a trav\u00e9s de una URL que contiene autenticaci\u00f3n b\u00e1sica, seg\u00fan lo demostrado por http://mysite.example.com\\@attacker.com." } ], "id": "CVE-2016-2512", "lastModified": "2024-11-21T02:48:35.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-08T15:59:06.183", "references": [ { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3544" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/83879" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1035152" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0502.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0504.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0505.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0506.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/83879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2915-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2915-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2915-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-07 02:15
Modified
2024-11-21 08:01
Severity ?
Summary
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | 4.2 | |
djangoproject | django | 4.2 | |
djangoproject | django | 4.2 | |
fedoraproject | fedora | 38 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "11799E5A-8045-48F2-BFBF-C377FD718F39", "versionEndExcluding": "3.2.19", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEC3B71C-022D-443A-AF8B-F3C13268C669", "versionEndExcluding": "4.1.9", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:4.2:-:*:*:*:*:*:*", "matchCriteriaId": "6047ED22-7DD3-419E-B906-B120096CD8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:4.2:b1:*:*:*:*:*:*", "matchCriteriaId": "47CC8B88-335C-4E6A-8AC9-DC6D5297607A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:4.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "23FA889E-19AF-4AE9-AF47-00561632B438", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django\u0027s \"Uploading multiple files\" documentation suggested otherwise." } ], "id": "CVE-2023-31047", "lastModified": "2024-11-21T08:01:19.110", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-07T02:15:08.917", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230609-0008/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20230609-0008/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-03 17:29
Modified
2024-11-21 04:22
Severity ?
Summary
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B14F0D9-4ECC-4A82-9486-76A9FD17494F", "versionEndExcluding": "1.11.21", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B7CE172-68F7-48FD-9158-FE1B1CA4C296", "versionEndExcluding": "2.1.9", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE916E62-8D25-4406-B096-C3224048E909", "versionEndExcluding": "2.2.2", "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 1.11 antes de 1.11.21, 2.1 anterior de la versi\u00f3n 2.1.9 y 2.2 anterior de la versi\u00f3n 2.2.2. El valor de la URL actual en la que se puede hacer clic, mostrado por el AdminURLFieldWidget, muestra el valor proporcionado sin validarlo como una URL segura. Por lo tanto, un valor no validado almacenado en la base de datos, o un valor proporcionado como una carga \u00fatil del par\u00e1metro de consulta de URL, podr\u00eda resultar en un enlace de JavaScript que se puede hacer clic." } ], "id": "CVE-2019-12308", "lastModified": "2024-11-21T04:22:35.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-03T17:29:01.213", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/03/2" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/108559" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/1.11.21/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.1.9/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.2.2/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4043-1/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2019/dsa-4476" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/03/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/108559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/1.11.21/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.1.9/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/2.2.2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Jul/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4043-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-03 14:15
Modified
2024-11-21 07:12
Severity ?
Summary
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F43CB4C3-700F-479A-B1DC-5AF8C28F59FB", "versionEndExcluding": "3.2.15", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F207BC68-F4FA-4783-A43E-693C6857811F", "versionEndExcluding": "4.0.7", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input." }, { "lang": "es", "value": "Se ha detectado un problema en la clase HTTP FileResponse en Django versiones 3.2 anteriores a 3.2.15 y 4.0 anteriores a 4.0.7. Una aplicaci\u00f3n es vulnerable a un ataque de descarga de archivos reflejada (RFD) que establece el encabezado Content-Disposition de un FileResponse cuando el nombre del archivo es derivado de la entrada proporcionada por el usuario" } ], "id": "CVE-2022-36359", "lastModified": "2024-11-21T07:12:51.800", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-03T14:15:08.710", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/03/1" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable", "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://groups.google.com/g/django-announce/c/8cz--gvaJr4" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220915-0008/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/03/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://groups.google.com/g/django-announce/c/8cz--gvaJr4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220915-0008/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-494" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2024-11-21 01:47
Severity ?
Summary
The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3.1 | |
djangoproject | django | 1.3.2 | |
djangoproject | django | 1.3.3 | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 11.10 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "33D378F8-CFDC-4882-A838-406ABA7AD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "132795AE-92DD-42CB-A59E-5F7136F93B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B5BE262-260E-4250-8F68-7392FD68970E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F18B54E2-447B-4B38-9E88-6833F67EB24C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "C1E1C4B1-2A0A-459C-8348-AA7DA5C5B781", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:beta:*:*:*:*:*:*", "matchCriteriaId": "F979543B-913B-46E9-8A40-BE2707D297F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information." }, { "lang": "es", "value": "La interfaz administrativa para Django v1.3.x antes de v1.3.6, v1.4.x antes de v1.4.4, y v1.5 antes de la release candidate v2 no comprueba los permisos para la vista del historial, que permite a usuarios administradores autenticados obtener informaci\u00f3n del historial." } ], "evaluatorImpact": "Per http://www.ubuntu.com/usn/usn-1757-1/\r\n\"A security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n Ubuntu 12.10\r\n Ubuntu 12.04 LTS\r\n Ubuntu 11.10\r\n Ubuntu 10.04 LTS\"", "id": "CVE-2013-0305", "lastModified": "2024-11-21T01:47:16.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T14:55:05.257", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-1757-1" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2634" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-1757-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-23 15:55
Modified
2024-11-21 02:02
Severity ?
Summary
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.5 | |
djangoproject | django | 1.5.1 | |
djangoproject | django | 1.5.2 | |
djangoproject | django | 1.5.3 | |
djangoproject | django | 1.5.4 | |
djangoproject | django | 1.5.5 | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7 | |
djangoproject | django | * | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.4.3 | |
djangoproject | django | 1.4.4 | |
djangoproject | django | 1.4.5 | |
djangoproject | django | 1.4.6 | |
djangoproject | django | 1.4.7 | |
djangoproject | django | 1.4.8 | |
djangoproject | django | 1.4.9 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.10 | |
canonical | ubuntu_linux | 14.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5463AB51-6088-473A-BB54-BB78ACFC6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:alpha1:*:*:*:*:*:*", "matchCriteriaId": "14EC0E5B-2CEC-450A-B5A2-16BE4147DB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:alpha2:*:*:*:*:*:*", "matchCriteriaId": "EDD55056-2537-4E69-9D9D-2697501C0EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D817D6FC-F568-46C9-B49E-7CD7457756E4", "versionEndIncluding": "1.4.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EDEF8A4-F929-49AB-A8CD-E40CCCDB638C", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users." }, { "lang": "es", "value": "La plataforma de cach\u00e9 en Django anterior a 1.4.11, 1.5.x anterior a 1.5.6, 1.6.x anterior a 1.6.3 y 1.7.x anterior a 1.7 beta 2 reutiliza un token de CSRF en cach\u00e9 para todos los usuarios an\u00f3nimos, lo que permite a atacantes remotos evadir protecciones de CSRF mediante la lectura del cookie de CSRF para usuarios an\u00f3nimos." } ], "id": "CVE-2014-0473", "lastModified": "2024-11-21T02:02:12.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-23T15:55:03.127", "references": [ { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "security@debian.org", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0456.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0457.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2169-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/apr/21/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-31 17:55
Modified
2024-11-21 01:40
Severity ?
Summary
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.1.4 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2-alpha1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.2.6 | |
djangoproject | django | 1.2.7 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "225CA836-30A5-45C2-8AF2-F11D95170303", "versionEndIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "E670BDE4-85E8-472F-B639-CB4CA53070A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "A6508CE5-0556-4889-9380-B6B06B79F515", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*", "matchCriteriaId": "1EEC80B3-36F1-48C7-A4C0-2144613E7C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "D827F8B8-60D5-443C-B8B6-AAFE7122DB96", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*", "matchCriteriaId": "CE5C74F9-41EB-4D29-BB68-A2C6F5E6FF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "F1694141-3247-46A3-9539-117016A100F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "CE66E695-67CC-418E-930B-F002CFDDA3E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "573ACC2E-1FAA-4609-8372-8C1A94C136A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "D7B67974-4584-411B-90BB-2D7BF06A8F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "89E29453-349B-4A50-8C8A-36550AFB6771", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*", "matchCriteriaId": "476CDAAC-84F9-42F8-BABC-121AD9674B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "19959A8A-7FF9-4318-803D-5CD9F866F795", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "9696406B-76A8-40C8-BD92-0A7ACBB53354", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "33D378F8-CFDC-4882-A838-406ABA7AD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image." }, { "lang": "es", "value": "La funci\u00f3n get_image_dimensions en la funcionalidad image-handling en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 un tama\u00f1o de trozo constante en todos los intentos por determinar las dimensiones, lo que permitir\u00eda a atacantes remotos a provocar una denegaci\u00f3n de servicio (consumo del proceso o hilo) a trav\u00e9s de una imagen TIFF grande." } ], "id": "CVE-2012-3444", "lastModified": "2024-11-21T01:40:53.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-31T17:55:04.623", "references": [ { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2529" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1560-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2024-11-21 01:47
Severity ?
Summary
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3.1 | |
djangoproject | django | 1.3.2 | |
djangoproject | django | 1.3.3 | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 | |
djangoproject | django | 1.4.2 | |
djangoproject | django | 1.5 | |
djangoproject | django | 1.5 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 11.10 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "33D378F8-CFDC-4882-A838-406ABA7AD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "132795AE-92DD-42CB-A59E-5F7136F93B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B5BE262-260E-4250-8F68-7392FD68970E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F18B54E2-447B-4B38-9E88-6833F67EB24C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "C1E1C4B1-2A0A-459C-8348-AA7DA5C5B781", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:beta:*:*:*:*:*:*", "matchCriteriaId": "F979543B-913B-46E9-8A40-BE2707D297F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el formulario \"library\" en Django v1.3.x antes de v1.3.6, v1.4.x antes de v1.4.4, v1.5 antes de release candidate v2 permite a atacantes remotos evitar las restricciones de los recursos y causar una denegaci\u00f3n de servicios (consumo de memoria) o disparar errores del servidor a trav\u00e9s de un par\u00e1metro max_num modificado." } ], "id": "CVE-2013-0306", "lastModified": "2024-11-21T01:47:16.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T14:55:05.277", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-1757-1" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2634" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0670.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-1757-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2013/feb/19/security/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-06 15:15
Modified
2024-11-21 06:00
Severity ?
Summary
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 9.0 | |
fedoraproject | fedora | 34 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EF13F74-904C-46BE-89F3-0D530D89961D", "versionEndExcluding": "2.2.20", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5308A30-2968-42DB-88E3-9C1A546E8F4F", "versionEndExcluding": "3.0.14", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA1FCB48-4616-4383-9C3D-7C86A05F260B", "versionEndExcluding": "3.1.8", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability." }, { "lang": "es", "value": "En Django versiones 2.2 anteriores a 2.2.20, versiones 3.0 anteriores a 3.0.14 y versiones 3.1 anteriores a 3.1.8, MultiPartParser permit\u00eda un salto de directorio por medio de archivos cargados con nombres de archivo adecuadamente dise\u00f1ados.\u0026#xa0;Los controladores de carga integrados no est\u00e1n afectados por esta vulnerabilidad" } ], "id": "CVE-2021-28658", "lastModified": "2024-11-21T06:00:02.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-06T15:15:13.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210528-0001/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.1/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210528-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-03 05:15
Modified
2024-11-21 08:20
Severity ?
Summary
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 39 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "787A1B2B-92D9-4AB3-92EF-9ACFC816941C", "versionEndExcluding": "3.2.21", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "19DCBA7A-59D0-48D3-B914-9A1FD766BDD9", "versionEndExcluding": "4.1.11", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "9423A928-5354-4042-92C4-FE3B0B2CE4D9", "versionEndExcluding": "4.2.5", "versionStartIncluding": "4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters." }, { "lang": "es", "value": "En Django 3.2 anterior a 3.2.21, 4.1 anterior a 4.1.11 y 4.2 anterior a 4.2.5, django.utils.encoding.uri_to_iri() est\u00e1 sujeto a un posible ataque DoS (denegaci\u00f3n de servicio) a trav\u00e9s de ciertas entradas con un n\u00famero muy grande de caracteres Unicode." } ], "id": "CVE-2023-41164", "lastModified": "2024-11-21T08:20:42.437", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-03T05:15:29.447", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20231214-0002/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20231214-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-14 17:59
Modified
2024-11-21 02:32
Severity ?
Summary
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "26F14869-45E4-4A7D-827D-B769A605B575", "versionEndIncluding": "1.4.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFC18F77-77CB-45CB-869E-267DACD19601", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "0B3937A5-D537-4A9A-B7EF-0F7C441EE520", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "5B63ECA8-0AD0-4670-B026-6762DCC65D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB39F768-9616-4C56-9613-55A5229DDCA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "9074F301-7595-464A-8DE5-41E78E5EE804", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "32DDDBEB-6F2F-4BA9-876D-38D41BA29726", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "61680046-51CD-4217-AC1E-C11265205DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6DAD077F-A239-4021-890E-AD4D9D9A388D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2DCD8E1-EF0F-4878-8952-E0F729A524C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3CB49AF-2A89-4277-B2E9-67803A395A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator." }, { "lang": "es", "value": "Django antes de 1.4.21, de 1.5.x hasta 1.6.x, 1.7.x anteriores a 1.7.9 y 1.8.x anteriores a 1.8.3 utiliza una expresi\u00f3n regular incorrecta lo que permite a atacantes remotos inyectar cabeceras arbitrarias para realizar ataques de divisi\u00f3n de respuesta HTTP a trav\u00e9s de un caracter de nueva l\u00ednea en (1) mensaje de correo electr\u00f3nico al EmailValidator, ( 2 ) una URL al URLValidator o vectores no especificados en el ( 3 ) validate_ipv4_address o (4 ) validador validate_slug." } ], "id": "CVE-2015-5144", "lastModified": "2024-11-21T02:32:26.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-14T17:59:07.493", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75665" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032820" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201510-06" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2671-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201510-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-09 20:29
Modified
2024-11-21 04:12
Severity ?
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | openstack | 10 | |
redhat | openstack | 13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "96EB9D8B-0C33-4380-ACAB-D6E1C5962A34", "versionEndExcluding": "1.8.19", "versionStartIncluding": "1.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A74E078B-62BB-4152-A18D-56CC11C0CF79", "versionEndExcluding": "1.11.11", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9B61A1-0ED0-412E-B8A4-DE09598CC2A9", "versionEndExcluding": "2.0.3", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "matchCriteriaId": "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable." }, { "lang": "es", "value": "Se ha descubierto un problema en Django, en versiones 2.0 anteriores a la 2.0.3; versiones 1.11 anteriores a la 1.11.11 y versiones 1.8 anteriores a la 1.8.19. La funci\u00f3n django.utils.html.urlize() fue extremadamente lenta a la hora de evaluar ciertas entradas debido a vulnerabilidades catastr\u00f3ficas de b\u00fasqueda hacia atr\u00e1s en dos expresiones regulares (solo una en el caso de las versiones 1.8.x de Django). La funci\u00f3n urlize() se emplea para implementar las plantillas de filtro urlize y urlizetrunc que, por lo tanto, eran vulnerables." } ], "id": "CVE-2018-7536", "lastModified": "2024-11-21T04:12:19.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-09T20:29:00.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103361" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0051" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0082" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4161" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3591-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-185" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | 1.6.3 | |
djangoproject | django | 1.6.4 | |
djangoproject | django | 1.6.5 | |
djangoproject | django | 1.6.6 | |
djangoproject | django | 1.6.7 | |
djangoproject | django | 1.6.8 | |
djangoproject | django | 1.6.9 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7.1 | |
djangoproject | django | 1.7.2 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E636F6CA-1979-43DA-A12F-23EC009B4A65", "versionEndIncluding": "1.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5463AB51-6088-473A-BB54-BB78ACFC6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "72653EB4-CE19-42FC-9C99-5CB391DABE7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*", "matchCriteriaId": "823E02CA-A145-46C2-BC4C-16DECB060B19", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*", "matchCriteriaId": "E685F933-7C10-49B6-9F4B-89478AF51761", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file." }, { "lang": "es", "value": "La visualizaci\u00f3n django.views.static.serve en Django anterior a 1.4.18, 1.6.x anterior a 1.6.10, y 1.7.x anterior a 1.7.3 lee ficheros por l\u00edneas enteras, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de una l\u00ednea larga en un fichero." } ], "id": "CVE-2015-0221", "lastModified": "2024-11-21T02:22:34.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-16T16:59:20.420", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62285" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62309" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62718" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:49
Severity ?
Summary
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7324BB5-64C7-45F6-ADEB-E0929B4B00B6", "versionEndExcluding": "2.2.27", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB946-FCF5-43FC-99EF-EBB2513CA2FB", "versionEndExcluding": "3.2.12", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA09D497-21DD-410D-9692-A601B1EAA0B9", "versionEndExcluding": "4.0.2", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files." }, { "lang": "es", "value": "Se ha detectado un problema en MultiPartParser en Django versiones 2.2 anteriores a 2.2.27, 3.2 anteriores a 3.2.12 y 4.0 anteriores a 4.0.2. Pasar determinadas entradas a formularios multiparte pod\u00eda resultar en un bucle infinito cuando eran analizados los archivos" } ], "id": "CVE-2022-23833", "lastModified": "2024-11-21T06:49:20.623", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:07.623", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468" }, { "source": "cve@mitre.org", "url": "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220221-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
djangoproject | django | * | |
djangoproject | django | 1.6 | |
djangoproject | django | 1.6.1 | |
djangoproject | django | 1.6.2 | |
djangoproject | django | 1.6.3 | |
djangoproject | django | 1.6.4 | |
djangoproject | django | 1.6.5 | |
djangoproject | django | 1.6.6 | |
djangoproject | django | 1.6.7 | |
djangoproject | django | 1.6.8 | |
djangoproject | django | 1.6.9 | |
djangoproject | django | 1.7 | |
djangoproject | django | 1.7.1 | |
djangoproject | django | 1.7.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*", "matchCriteriaId": "823E02CA-A145-46C2-BC4C-16DECB060B19", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*", "matchCriteriaId": "E685F933-7C10-49B6-9F4B-89478AF51761", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E636F6CA-1979-43DA-A12F-23EC009B4A65", "versionEndIncluding": "1.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5463AB51-6088-473A-BB54-BB78ACFC6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "80E8431B-FEA1-4D94-B367-56E8678C3CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "ABB56113-5E66-4EE9-B551-FD40C2FE307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "A2985241-279F-46AC-8BBF-DF2F439FE720", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "72653EB4-CE19-42FC-9C99-5CB391DABE7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries." }, { "lang": "es", "value": "ModelMultipleChoiceField en Django 1.6.x anterior a 1.6.10 y 1.7.x anterior a 1.7.3, cuando show_hidden_initial est\u00e1 configurado a \u0027True\u0027, permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante la presentaci\u00f3n de valores duplicados, lo que provoca un n\u00famero grande de consultas SQL." } ], "id": "CVE-2015-0222", "lastModified": "2024-11-21T02:22:35.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-16T16:59:21.217", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62285" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/62309" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2469-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-17" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-04 17:59
Modified
2024-11-21 03:31
Severity ?
Summary
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:a1:*:*:*:*:*:*", "matchCriteriaId": "85ED1834-500C-4E37-BD51-E42DB28F3B67", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:b1:*:*:*:*:*:*", "matchCriteriaId": "E6E3323E-6AC0-4703-A3A4-A429946B0839", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:b2:*:*:*:*:*:*", "matchCriteriaId": "7AB300FB-2A7D-498E-891D-E75DCA9ED7A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:c1:*:*:*:*:*:*", "matchCriteriaId": "1AC1822A-A7FE-4F38-BD5A-74388A5405D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "63D36984-4C8E-4CDB-8D15-445705FCECF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B324AE6-ADD8-41B9-B250-A6577ACBB364", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6487058-6768-4AD3-BE27-A0B3D1ACFC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CFF0538-B111-44A8-ADC2-87E280186257", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "C3343FF8-53EC-459D-B31C-CD363D04FF42", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "B9B637E9-067A-4473-9B50-433CCC177982", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "99A5BF6D-631B-4C8E-9868-579BD79100C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "280B9958-9163-4126-910A-2EF4B408DFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "6A40373B-301E-4B81-8FA5-28D916142F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "79BB3174-7859-4195-B7B3-BCAA280A6F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "42EF41AF-B2FA-468A-B161-D9FE29CE53EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "48DF0100-F98E-4997-A8F7-DC07FA4A06D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "ECDC5647-8EA7-4595-88C2-541BC489ED2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.16:*:*:*:*:*:*:*", "matchCriteriaId": "EB571E66-C1B2-4FFD-8265-FB381CF4ACE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "C49F25DA-CD52-49A9-B5BE-63FD399A9813", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:a1:*:*:*:*:*:*", "matchCriteriaId": "0B4797F9-82E9-4BA8-868D-C6F18BA01DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:b1:*:*:*:*:*:*", "matchCriteriaId": "E885D945-FB55-47F4-AA6B-462AFBDAD750", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:rc1:*:*:*:*:*:*", "matchCriteriaId": "48BD4296-E83B-4563-9A39-70C95EEAA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:rc2:*:*:*:*:*:*", "matchCriteriaId": "F63D8C0A-D93E-4A1F-A8F8-D22314771AD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A18691A7-E4D0-48A4-81A7-89846E991AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C06EBD9-381E-4018-BFDC-E23EA18097B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7D134048-B64F-45AE-B4A2-26E516CCF37B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "64A4030E-F51F-4944-BCE7-E27CD32EC7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "CCC1F046-DAF7-4734-9F80-A3C57857AF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "61EE8536-0E8D-477A-B8EA-817CE21D516A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "483D0F44-15C8-43A2-B3AE-331F40DA1A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "DD33E383-2772-4F79-A2C9-4F9EB8FBC8EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "77D82BAD-B2AE-49FB-AF71-393631D2B29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D2541CE-0462-46DF-BDD8-C19D6E45140B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:a1:*:*:*:*:*:*", "matchCriteriaId": "1763E8EB-F943-4A9A-8E19-E6BE9F847DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:b1:*:*:*:*:*:*", "matchCriteriaId": "48E20213-67BB-4A16-B961-502BA4E54A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3C71C2E3-C134-45B0-BDDC-FFE7612AB1EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CE31960-7C68-42F3-B215-B30A87DB67CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D6C6214-7946-4025-84E6-59448CFE75B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "58182835-CB1F-4490-AE65-90601DBFD0D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "04AE04CD-E923-4630-9BAA-5A4D5A5D0055", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "2517FB1C-B732-432B-9F27-EE60F6556433", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability." }, { "lang": "es", "value": "Una URL maliciosa manipulada a una sitio Django (1.10 en versiones anteriores a 1.10.7, 1.9 en versiones anteriores a 1.9.13, y 1.8 en versiones anteriores a 1.8.18) que usa la vista ``django.views.static.serve()`` podr\u00eda redirigir a cualquier otro dominio, tambi\u00e9n conocido como una vulnerabilidad de redirecci\u00f3n abierta." } ], "id": "CVE-2017-7234", "lastModified": "2024-11-21T03:31:26.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-04T17:59:00.303", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97401" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038177" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-03 14:15
Modified
2024-11-21 05:01
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 32 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
netapp | sra_plugin | - | |
netapp | steelstore_cloud_integrated_storage | - | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
oracle | zfs_storage_appliance_kit | 8.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "93BB1B8B-778D-4625-BCA4-245FA7CB7EB3", "versionEndExcluding": "2.2.13", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8843BC60-8D53-469D-A194-BB5259C317E8", "versionEndExcluding": "3.0.7", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:sra_plugin:-:*:*:*:*:linux:*:*", "matchCriteriaId": "96EEC4C4-E4A9-4CB3-8801-2DD26C00AC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 2.2 anteriores a 2.2.13 y versiones 3.0 anteriores a 3.0.7. En casos donde un backend memcached no lleva a cabo una comprobaci\u00f3n de la clave, pasa claves de cach\u00e9 maliciosas que podr\u00eda resultar en una colisi\u00f3n de claves y una potencial filtraci\u00f3n de datos." } ], "id": "CVE-2020-13596", "lastModified": "2024-11-21T05:01:34.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-03T14:15:12.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4381-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-02 15:15
Modified
2024-11-21 04:26
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49BD116-09A6-454E-BB68-65FCDE06DF33", "versionEndExcluding": "1.11.23", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D05096B-F60E-4DB2-AE59-EED55F945AB0", "versionEndExcluding": "2.1.11", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B", "versionEndExcluding": "2.2.4", "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a 2.1.11 y versiones 2.2.x anteriores a 2.2.4. Debido al comportamiento del HTMLParser subyacente, django.utils.html.strip_tags ser\u00eda extremadamente lento para evaluar ciertas entradas que contienen secuencias largas de entidades HTML incompletas anidadas." } ], "id": "CVE-2019-14233", "lastModified": "2024-11-21T04:26:15.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-02T15:15:11.943", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-10 20:00
Modified
2024-11-21 01:21
Severity ?
Summary
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.91 | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.95.1 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "3216CF3F-DC3B-41E5-AAEF-6E6939E4F219", "versionEndIncluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "C40AD94B-AC89-4404-973F-5E60468D06EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A952FB-3A74-4A39-8870-1F37059C9D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*", "matchCriteriaId": "AF1504F2-968F-4E1A-A143-BE494E658DF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer." }, { "lang": "es", "value": "La funcionalidad de restablecimiento de contrase\u00f1a en django.contrib.auth en Django antes de v1.1.3, v1.2.x antes de v1.2.4, y v1.3.x antes de v1.3 beta 1 no valida la longitud de una cadena que representa una marca de tiempo en base36, que permite a atacantes remotos ausar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de una URL que especifica un gran n\u00famero entero en base36." } ], "id": "CVE-2010-4535", "lastModified": "2024-11-21T01:21:09.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-10T20:00:16.937", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://code.djangoproject.com/changeset/15032" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42715" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42827" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42913" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45563" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.djangoproject.com/changeset/15032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2010/dec/22/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/12/23/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/03/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1040-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665373" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-18 23:55
Modified
2024-11-21 01:43
Severity ?
Summary
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3.1 | |
djangoproject | django | 1.3.2 | |
djangoproject | django | 1.3.3 | |
djangoproject | django | 1.4 | |
djangoproject | django | 1.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "33D378F8-CFDC-4882-A838-406ABA7AD8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "132795AE-92DD-42CB-A59E-5F7136F93B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B5BE262-260E-4250-8F68-7392FD68970E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F18B54E2-447B-4B38-9E88-6833F67EB24C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values." }, { "lang": "es", "value": "La funci\u00f3n django.http.HttpRequest.get_host en Django v1.3.x antes de v1.3.4 y v1.4.x antes de v1.4.2, permite a atacantes remotos generar y mostrar URLs de su elecci\u00f3n a trav\u00e9s de nombre de usuario y contrase\u00f1a de la cabecera Host manipulados." } ], "id": "CVE-2012-4520", "lastModified": "2024-11-21T01:43:03.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-18T23:55:01.040", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51033" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51314" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1027708" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-1632-1" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-1757-1" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2634" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/10/30/4" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/86493" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865164" }, { "source": "secalert@redhat.com", "url": "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3" }, { "source": "secalert@redhat.com", "url": "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e" }, { "source": "secalert@redhat.com", "url": "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/oct/17/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1027708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-1632-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-1757-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/10/30/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/86493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2012/oct/17/security/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "matchCriteriaId": "29477EEA-D5F8-45A9-9777-8A6BC7C668A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "A83451BD-1D67-4A7F-A62C-F597E51FCC21", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "matchCriteriaId": "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "matchCriteriaId": "07B12D68-BB49-4931-9D9E-D8134FC0B350", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CC369A0-0092-450D-91E9-13C7AF7EBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "55460F1D-661B-465C-8A22-E4E6DA2834B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCDB4B76-6541-4405-B74C-3EEAF84A04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E2A29CC-A92B-4EC1-8225-408A5048C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "73317E26-AA3A-4437-9261-CE76BC1A0749", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A666B9E5-EA1B-4FA9-A685-61ECF26CB084", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EB3FED4-C50A-4449-9A7B-552CFB02F860", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B4F3D5C-5768-48F1-8A39-1B87EC061F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B10E08DF-6B92-452A-876B-DC8D376B0B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFC18F77-77CB-45CB-869E-267DACD19601", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EA690BD-2FBA-425B-AC6F-046081E21183", "versionEndIncluding": "1.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated." }, { "lang": "es", "value": "La funci\u00f3n core.urlresolvers.reverse en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3 no valida debidamente las URLs, lo que permite a atacantes remotos realizar ataques de phishing a trav\u00e9s de un // (barra barra) en una URL, lo que provoca que se genere una URL relacionada con esquemas." } ], "id": "CVE-2014-0480", "lastModified": "2024-11-21T02:02:13.383", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-08-26T14:55:05.190", "references": [ { "source": "security@debian.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/59782" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61276" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/61281" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/69425" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2014/aug/20/security/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-06 22:16
Modified
2024-11-21 08:59
Severity ?
Summary
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "527AB2FB-6590-4F90-B749-451EA45741FB", "versionEndExcluding": "3.2.24", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0C66920-1C09-4572-985B-8948D9DA1F11", "versionEndExcluding": "4.2.10", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD053762-6CAA-4F50-BE69-39F466C9079A", "versionEndExcluding": "5.0.2", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Django 3.2 anterior a 3.2.24, 4.2 anterior a 4.2.10 y Django 5.0 anterior a 5.0.2. El filtro de plantilla intcomma estaba sujeto a un posible ataque de denegaci\u00f3n de servicio cuando se utilizaba con cadenas muy largas." } ], "id": "CVE-2024-24680", "lastModified": "2024-11-21T08:59:29.843", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-06T22:16:15.470", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/5.0/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/5.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | 0.91 | |
djangoproject | django | 0.95 | |
djangoproject | django | 0.95.1 | |
djangoproject | django | 0.96 | |
djangoproject | django | 1.0 | |
djangoproject | django | 1.0.1 | |
djangoproject | django | 1.0.2 | |
djangoproject | django | 1.1 | |
djangoproject | django | 1.1.0 | |
djangoproject | django | 1.1.2 | |
djangoproject | django | 1.1.3 | |
djangoproject | django | 1.2 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.1 | |
djangoproject | django | 1.2.2 | |
djangoproject | django | 1.2.3 | |
djangoproject | django | 1.2.4 | |
djangoproject | django | 1.2.5 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 | |
djangoproject | django | 1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "96EC0AAD-1199-4CDB-B599-A7959A160CB6", "versionEndIncluding": "1.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "C40AD94B-AC89-4404-973F-5E60468D06EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "529CD787-1C98-4F20-8A3D-90BF2B0BD790", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "65A952FB-3A74-4A39-8870-1F37059C9D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "59302184-7805-4D50-B25C-73E59DAA1E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DAB4639-B81D-412A-A081-EFF46737CA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D338D9-1504-4933-B833-BD7F1864E89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD257D91-EF31-4103-9007-944603ABA271", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "99387F31-9E04-4A73-A1C6-C05F96A8DB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*", "matchCriteriaId": "F75FE4BB-2C64-404F-9347-25289556BE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "064C9403-8A43-42C7-A1FD-03CC49A32FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5BCDB95B-88F2-466A-A4F9-4C080183E39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "17B99C62-A653-45C1-A061-05A8FAD52107", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA5071B-808F-490E-B407-37CD24ACCA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*", "matchCriteriaId": "AF1504F2-968F-4E1A-A143-BE494E658DF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code." }, { "lang": "es", "value": "El mecanismo de protecci\u00f3n ante CSRF de Django hasta la versi\u00f3n 1.2.7 y 1.3.x hasta la 1.3.1 no maneja apropiadamente las configuraciones del servidor web que soportan cabeceras HTTP Host arbitrarias, lo que permite a atacantes remotos provocar peticiones falsificadas sin autenticar a trav\u00e9s de vectores que involucran un registro DNS CNAME y una p\u00e1gina web que contenga c\u00f3digo JavaScript." } ], "id": "CVE-2011-4140", "lastModified": "2024-11-21T01:31:55.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-10-19T10:55:04.643", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/46614" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/09/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/14700881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2011/sep/09/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.djangoproject.com/weblog/2011/sep/10/127/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-05 15:59
Modified
2024-11-21 02:55
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 8.0 | |
djangoproject | django | * | |
djangoproject | django | 1.9 | |
djangoproject | django | 1.9.0 | |
djangoproject | django | 1.9.1 | |
djangoproject | django | 1.9.2 | |
djangoproject | django | 1.9.3 | |
djangoproject | django | 1.9.4 | |
djangoproject | django | 1.9.5 | |
djangoproject | django | 1.9.6 | |
djangoproject | django | 1.9.7 | |
djangoproject | django | 1.10 | |
djangoproject | django | 1.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "08E370D6-9EA2-48B6-AA81-B98D982679FA", "versionEndIncluding": "1.8.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "29C40BAC-6DF3-4EA2-A65A-86462DDD8723", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "832F9FA9-5FC8-4DB6-AD39-C3D1C21C4568", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B754401-8503-4553-853F-4F6BCD2D2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "019C26C7-EF1F-45BB-934E-521E2E64452E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "A18691A7-E4D0-48A4-81A7-89846E991AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C06EBD9-381E-4018-BFDC-E23EA18097B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7D134048-B64F-45AE-B4A2-26E516CCF37B", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "64A4030E-F51F-4944-BCE7-E27CD32EC7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10:alpha1:*:*:*:*:*:*", "matchCriteriaId": "36ECEDD6-A60B-4DE1-881B-899641489BAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "035DDCD9-7679-4106-BCDA-89D67195D5E8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la funci\u00f3n dismissChangeRelatedObjectPopup en contrib/admin/static/admin/js/admin/RelatedObjectLookups.js en Django en versiones anteriores a 1.8.14, 1.9.x en versiones anteriores a 1.9.8 y 1.10.x en versiones anteriores a 1.10rc1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectors relacionados con el uso no seguro de Element.innerHTML." } ], "id": "CVE-2016-6186", "lastModified": "2024-11-21T02:55:37.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T15:59:09.503", "references": [ { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1594.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1595.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1596.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/53" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3622" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/538947/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/92058" }, { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036338" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3039-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.vulnerability-lab.com/get_content.php?id=1869" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/40129/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1595.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538947/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3039-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.vulnerability-lab.com/get_content.php?id=1869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/40129/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-24 14:59
Modified
2024-11-21 02:34
Severity ?
Summary
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "4166ADA9-D5B4-47D6-BD93-C98841108275", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "080D43D0-C0FF-4F89-910C-D466943816C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E04AE832-9059-42AB-AD39-D01E7A633615", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "C571F85F-9F49-48B6-9AD9-16CD81655F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "41F0F1FA-E3EC-421C-9F72-11FC857F6F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "7B1577DD-B40E-404B-8E55-3A93AB8A8F62", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "10CE2864-1EF6-4197-9D1F-051497F1CC5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "ED485DA4-0614-4788-B278-5F1F43F5A579", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "1C3B4B46-383E-498C-8EFD-8C3FB1F494B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "1E1359DE-835F-4748-95F4-D2990DBF6A8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "DE466393-EE2B-44AD-8C69-D4C34A773FFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "B3C103B6-2FB6-4BF5-B88C-A68DEBABBBCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "5E4CCE84-425C-4B9C-98B7-D858B64B3418", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "B6B77FCE-F26A-41CB-8D72-E9EF0E352288", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "matchCriteriaId": "985884FE-AEB9-4D93-806E-ADFCC576FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "81798B3D-A000-40D5-A369-C9A0BEF79A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "32DDDBEB-6F2F-4BA9-876D-38D41BA29726", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6004EA17-A2B4-4E4C-A738-210FCAC2CA32", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "61680046-51CD-4217-AC1E-C11265205DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6DAD077F-A239-4021-890E-AD4D9D9A388D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2DCD8E1-EF0F-4878-8952-E0F729A524C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3CB49AF-2A89-4277-B2E9-67803A395A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B388C7-ED4E-4416-969F-32263E7D7AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "63D36984-4C8E-4CDB-8D15-445705FCECF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record." }, { "lang": "es", "value": "Vulnerabilidad en contrib.sessions.middleware.SessionMiddleware en Django 1.8.x en versiones anteriores a 1.8.4, 1.7.x en versiones anteriores a 1.7.10, 1.4.x en versiones anteriores a 1.4.22 y posiblemente otras versiones, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de almac\u00e9n de sesi\u00f3n o eliminaci\u00f3n de registro de sesi\u00f3n) a trav\u00e9s de un gran n\u00famero de peticiones a contrib.auth.views.logout, lo que desencadena la creaci\u00f3n de un registro de sesi\u00f3n vac\u00edo." } ], "id": "CVE-2015-5963", "lastModified": "2024-11-21T02:34:13.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-24T14:59:08.773", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3338" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/76428" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1033318" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2015:1876" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1766.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1767.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1894.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2720-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2015:1876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-09 23:29
Modified
2024-11-21 04:42
Severity ?
Summary
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
fedoraproject | fedora | 28 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "C84D66BB-CC5E-459D-96DB-E5DC39B2D78C", "versionEndExcluding": "1.11.18", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A42F39FE-26F2-4165-8C46-12070A4E86D6", "versionEndExcluding": "2.0.10", "versionStartIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D957B9E2-3156-4B32-B62F-235EDEDD6782", "versionEndExcluding": "2.1.5", "versionStartIncluding": "2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "matchCriteriaId": "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content." }, { "lang": "es", "value": "En Django, en versiones 1.11.x anteriores a la 1.11.18, versiones 2.0.x anteriores a la 2.0.10 y 2.1.x anteriores a la 2.1.5, existe una neutralizaci\u00f3n incorrecta de elementos especiales en las salidas empleadas por un componente de bajada en django.views.defaults.page_not_found(), lo que conduce a la suplantaci\u00f3n de contenido (en una p\u00e1gina de error 404) si un usuario fracasa a la hora de reconocer que una URL manipulada tiene contenido malicioso." } ], "id": "CVE-2019-3498", "lastModified": "2024-11-21T04:42:08.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-09T23:29:05.387", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106453" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3851-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4363" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3851-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-10-13 10:30
Modified
2024-11-21 01:07
Severity ?
Summary
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.0 | |
djangoproject | django | 1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9023348-07A7-46E8-B45A-CC19563C5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56846659-96C8-497C-8404-3975E5B6385B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression." }, { "lang": "es", "value": "Vulnerabilidad de complejidad algor\u00edtmica en la forma library en Django v1.0 anterior v1.0.4 y v1.1 anterior v1.1.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo CPU( a trav\u00e9s de (1) EmailField (direcci\u00f3n email) o (2) URLField (URL)que provoca una gran cantidad de backtracking (vuelta a atr\u00e1s) en una expresi\u00f3n regular." } ], "id": "CVE-2009-3695", "lastModified": "2024-11-21T01:07:58.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-10-13T10:30:00.767", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457" }, { "source": "cve@mitre.org", "url": "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36948" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36968" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1905" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2009/oct/09/security/" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2009/10/13/6" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36655" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2871" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.djangoproject.com/weblog/2009/oct/09/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/10/13/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-02 14:59
Modified
2024-11-21 02:30
Severity ?
Summary
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | 1.8.0 | |
djangoproject | django | 1.8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D3C0FF-C342-40F1-A187-CD212C16FE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key." }, { "lang": "es", "value": "La funci\u00f3n session.flush en el backend cached_db en Django 1.8.x anterior a 1.8.2 no vac\u00eda correctamente la sesi\u00f3n, lo que permite a atacantes remotos secuestrar las sesiones de usuarios a trav\u00e9s de una cadena vac\u00eda en la clave de la sesi\u00f3n." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/384.html\"\u003eCWE-384: Session Fixation\u003c/a\u003e", "id": "CVE-2015-3982", "lastModified": "2024-11-21T02:30:12.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-02T14:59:10.987", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/74960" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/may/20/security-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2015/may/20/security-release/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-01 19:15
Modified
2024-11-21 07:47
Severity ?
Summary
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDA5D2BA-8195-4151-81BF-61B77617DB02", "versionEndExcluding": "3.2.17", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "4722ED63-A5C3-483E-9C70-CDAF197486BE", "versionEndExcluding": "4.0.9", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E71A1487-1E70-4162-8DDF-697CA23C5A05", "versionEndExcluding": "4.1.6", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large." } ], "id": "CVE-2023-23969", "lastModified": "2024-11-21T07:47:10.833", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-01T19:15:08.763", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230302-0007/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.1/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20230302-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-02 15:15
Modified
2024-11-21 04:26
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49BD116-09A6-454E-BB68-65FCDE06DF33", "versionEndExcluding": "1.11.23", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D05096B-F60E-4DB2-AE59-EED55F945AB0", "versionEndExcluding": "2.1.11", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B", "versionEndExcluding": "2.2.4", "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator\u0027s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a 2.1.11 y versiones 2.2.x anteriores a 2.2.4. Si los m\u00e9todos chars() y words() de django.utils.text.Truncator pasaron el argumento html=True, fueron extremadamente lentos para evaluar ciertas entradas debido a una vulnerabilidad de retroceso catastr\u00f3fico en una expresi\u00f3n regular. Los m\u00e9todos chars() y words() se usan para implementar los filtros de plantilla truncatechars_html y truncatewords_html, que eran por lo tanto vulnerables." } ], "id": "CVE-2019-14232", "lastModified": "2024-11-21T04:26:15.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-08-02T15:15:11.880", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2023/10/04/6" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2023/10/04/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-02 15:15
Modified
2024-11-21 04:26
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49BD116-09A6-454E-BB68-65FCDE06DF33", "versionEndExcluding": "1.11.23", "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D05096B-F60E-4DB2-AE59-EED55F945AB0", "versionEndExcluding": "2.1.11", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B", "versionEndExcluding": "2.2.4", "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a 2.1.11 y versiones 2.2.x anteriores a 2.2.4. Si pasaron ciertas entradas, django.utils.encoding.uri_to_iri podr\u00eda conllevar a un uso de la memoria significativo debido a una recursi\u00f3n cuando se codifican por resonancia las secuencias de octetos UTF-8 inv\u00e1lidas." } ], "id": "CVE-2019-14235", "lastModified": "2024-11-21T04:26:15.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-02T15:15:12.023", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-12 05:15
Modified
2024-11-21 06:57
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "A545BDF6-D358-44FB-8FF7-5D0166DC6B9B", "versionEndExcluding": "2.2.28", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED1BF93-9E2C-457C-9596-F946FE223BAD", "versionEndExcluding": "3.2.13", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "36239F45-F5DF-4014-A2D0-F691D749C4CF", "versionEndExcluding": "4.0.4", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs." }, { "lang": "es", "value": "Se ha detectado un problema en Django versiones 2.2 anteriores a 2.2.28, 3.2 anteriores a 3.2.13 y 4.0 anteriores a 4.0.4. Los m\u00e9todos QuerySet.annotate(), aggregate() y extra() est\u00e1n sujetos a inyecci\u00f3n SQL en los alias de columna por medio de un diccionario dise\u00f1ado (con expansi\u00f3n de diccionario) como los **kwargs pasados" } ], "id": "CVE-2022-28346", "lastModified": "2024-11-21T06:57:11.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-12T05:15:06.927", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220609-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220609-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-03 05:15
Modified
2024-11-21 08:24
Severity ?
Summary
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 39 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BA393E1-3182-4225-9C9E-9ADEFDB870B5", "versionEndExcluding": "3.2.22", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6A68CC8-3ABF-4E38-97AB-9AE50A6FBACF", "versionEndExcluding": "4.1.12", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "80AE2E8A-697C-4495-84C0-A439EAA7D657", "versionEndExcluding": "4.2.6", "versionStartIncluding": "4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232." }, { "lang": "es", "value": "En Django 3.2 anterior a 3.2.22, 4.1 anterior a 4.1.12 y 4.2 anterior a 4.2.6, los m\u00e9todos django.utils.text.Truncator chars() y palabras() (cuando se usan con html=True) est\u00e1n sujetos a un potencial Ataque DoS (denegaci\u00f3n de servicio) a trav\u00e9s de ciertas entradas con texto HTML muy largo y potencialmente mal formado. Los m\u00e9todos chars() y palabras() se utilizan para implementar los filtros de plantilla truncatechars_html y truncatewords_html, que por tanto tambi\u00e9n son vulnerables. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2019-14232." } ], "id": "CVE-2023-43665", "lastModified": "2024-11-21T08:24:34.663", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-03T05:15:30.047", "references": [ { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20231221-0001/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20231221-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-02 10:15
Modified
2024-11-21 06:11
Severity ?
Summary
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 34 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8638ED91-8E83-4894-B0BE-0C5344391CBB", "versionEndExcluding": "3.1.13", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8569B3E5-3A3A-4EDB-B057-9AF6E66677D0", "versionEndExcluding": "3.2.5", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application." }, { "lang": "es", "value": "Django versiones 3.1.x anteriores a 3.1.13 y versiones 3.2.x anteriores a 3.2.5, permiten la inyecci\u00f3n SQL de la funci\u00f3n QuerySet.order_by si el par\u00e1metro order_by es una entrada no fiable de un cliente de una aplicaci\u00f3n web" } ], "id": "CVE-2021-35042", "lastModified": "2024-11-21T06:11:43.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-02T10:15:07.653", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210805-0008/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/07/02/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/3.2/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210805-0008/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/07/02/2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-05 00:15
Modified
2024-11-21 06:31
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
djangoproject | django | * | |
djangoproject | django | * | |
djangoproject | django | * | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "E20BDA6F-5744-4B52-B995-529E3A14EF69", "versionEndExcluding": "2.2.26", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E0CB9E7-6BFE-4732-872F-1DE2BFCA9223", "versionEndExcluding": "3.2.11", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAF6F5EA-00FA-4871-A06F-0F6F7DF1D06D", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language\u0027s variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key." }, { "lang": "es", "value": "Se ha detectado un problema en Django versiones 2.2 anteriores a 2.2.26, 3.2 anteriores a 3.2.11 y 4.0 anteriores a 4.0.1. Debido al aprovechamiento de la l\u00f3gica de resoluci\u00f3n de variables del lenguaje de plantillas de Django, el filtro de plantillas dictsort era potencialmente vulnerable a una divulgaci\u00f3n de informaci\u00f3n, o a una llamada de m\u00e9todo no intencionada, si le es pasada una clave apropiadamente dise\u00f1ada." } ], "id": "CVE-2021-45116", "lastModified": "2024-11-21T06:31:59.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-05T00:15:07.953", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/4.0/releases/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21forum/django-announce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }