CVE-2015-0220

The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
VendorProductVersion
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
14.10
djangoprojectdjango
𝑥
≤ 1.4.17
djangoprojectdjango
1.6
djangoprojectdjango
1.6.1
djangoprojectdjango
1.6.2
djangoprojectdjango
1.6.3
djangoprojectdjango
1.6.4
djangoprojectdjango
1.6.5
djangoprojectdjango
1.6.6
djangoprojectdjango
1.6.7
djangoprojectdjango
1.6.8
djangoprojectdjango
1.6.9
djangoprojectdjango
1.7
djangoprojectdjango
1.7.1
djangoprojectdjango
1.7.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-django
bullseye (security)
2:2.2.28-1~deb11u2
fixed
bullseye
2:2.2.28-1~deb11u2
fixed
bookworm
3:3.2.19-1+deb12u1
fixed
bookworm (security)
3:3.2.19-1+deb12u1
fixed
sid
3:4.2.16-1
fixed
trixie
3:4.2.16-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-django
utopic
Fixed 1.6.6-1ubuntu2.1
released
trusty
Fixed 1.6.1-2ubuntu0.6
released
precise
Fixed 1.3.1-4ubuntu1.13
released
lucid
Fixed 1.1.1-2ubuntu1.14
released