CVE-2014-3730
16.05.2014, 15:55
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."Enginsight
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
canonical | ubuntu_linux | 13.10 |
canonical | ubuntu_linux | 14.04 |
djangoproject | django | 1.4 |
djangoproject | django | 1.4.1 |
djangoproject | django | 1.4.2 |
djangoproject | django | 1.4.4 |
djangoproject | django | 1.4.5 |
djangoproject | django | 1.4.6 |
djangoproject | django | 1.4.7 |
djangoproject | django | 1.4.8 |
djangoproject | django | 1.4.9 |
djangoproject | django | 1.4.10 |
djangoproject | django | 1.4.11 |
djangoproject | django | 1.4.12 |
djangoproject | django | 1.7:beta1 |
djangoproject | django | 1.7:beta2 |
djangoproject | django | 1.7:beta3 |
opensuse | opensuse | 12.3 |
opensuse | opensuse | 13.1 |
djangoproject | django | 1.6 |
djangoproject | django | 1.6:beta1 |
djangoproject | django | 1.6:beta2 |
djangoproject | django | 1.6:beta3 |
djangoproject | django | 1.6:beta4 |
djangoproject | django | 1.6.1 |
djangoproject | django | 1.6.2 |
djangoproject | django | 1.6.3 |
djangoproject | django | 1.6.4 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
djangoproject | django | 1.5 |
djangoproject | django | 1.5:alpha |
djangoproject | django | 1.5:beta |
djangoproject | django | 1.5.1 |
djangoproject | django | 1.5.2 |
djangoproject | django | 1.5.3 |
djangoproject | django | 1.5.4 |
djangoproject | django | 1.5.5 |
djangoproject | django | 1.5.6 |
djangoproject | django | 1.5.7 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References