4.3
CVSSv2

CVE-2015-0220

Published: 16/01/2015 Updated: 22/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The django.util.http.is_safe_url function in Django prior to 1.4.18, 1.6.x prior to 1.6.10, and 1.7.x prior to 1.7.3 does not properly handle leading whitespaces, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 10.04

djangoproject django 1.6.2

djangoproject django 1.6.3

djangoproject django 1.7

djangoproject django 1.7.1

djangoproject django

djangoproject django 1.6.6

djangoproject django 1.6.7

djangoproject django 1.6

djangoproject django 1.6.1

djangoproject django 1.6.8

djangoproject django 1.6.9

djangoproject django 1.6.4

djangoproject django 1.6.5

djangoproject django 1.7.2

Vendor Advisories

Debian Bug report logs - #775375 python-django: CVE-2015-0219 CVE-2015-0220 CVE-2015-0221 CVE-2015-0222 Package: src:python-django; Maintainer for src:python-django is Debian Python Modules Team <python-modules-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 14 Jan 2015 ...
USN-2469-1 caused a regression in Django ...
Several security issues were fixed in Django ...
Several vulnerabilities were discovered in Django, a high-level Python web development framework The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-0219 Jedediah Smith reported that the WSGI environ in Django does not distinguish between headers containing dashes and headers containing undersc ...
The djangoutilhttpis_safe_url function in Django before 1418, 16x before 1610, and 17x before 173 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL ...