CVE-2014-3730
16.05.2014, 15:55
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."Enginsight
| Vendor | Product | Version |
|---|---|---|
| canonical | ubuntu_linux | 10.04 |
| canonical | ubuntu_linux | 12.04 |
| canonical | ubuntu_linux | 12.10 |
| canonical | ubuntu_linux | 13.10 |
| canonical | ubuntu_linux | 14.04 |
| djangoproject | django | 1.4 |
| djangoproject | django | 1.4.1 |
| djangoproject | django | 1.4.2 |
| djangoproject | django | 1.4.4 |
| djangoproject | django | 1.4.5 |
| djangoproject | django | 1.4.6 |
| djangoproject | django | 1.4.7 |
| djangoproject | django | 1.4.8 |
| djangoproject | django | 1.4.9 |
| djangoproject | django | 1.4.10 |
| djangoproject | django | 1.4.11 |
| djangoproject | django | 1.4.12 |
| djangoproject | django | 1.7:beta1 |
| djangoproject | django | 1.7:beta2 |
| djangoproject | django | 1.7:beta3 |
| opensuse | opensuse | 12.3 |
| opensuse | opensuse | 13.1 |
| djangoproject | django | 1.6 |
| djangoproject | django | 1.6:beta1 |
| djangoproject | django | 1.6:beta2 |
| djangoproject | django | 1.6:beta3 |
| djangoproject | django | 1.6:beta4 |
| djangoproject | django | 1.6.1 |
| djangoproject | django | 1.6.2 |
| djangoproject | django | 1.6.3 |
| djangoproject | django | 1.6.4 |
| debian | debian_linux | 7.0 |
| debian | debian_linux | 8.0 |
| djangoproject | django | 1.5 |
| djangoproject | django | 1.5:alpha |
| djangoproject | django | 1.5:beta |
| djangoproject | django | 1.5.1 |
| djangoproject | django | 1.5.2 |
| djangoproject | django | 1.5.3 |
| djangoproject | django | 1.5.4 |
| djangoproject | django | 1.5.5 |
| djangoproject | django | 1.5.6 |
| djangoproject | django | 1.5.7 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References