Vulnerabilites related to djangoproject - django
cve-2021-35042
Vulnerability from cvelistv5
Published
2021-07-02 09:54
Modified
2024-08-04 00:33
Severity ?
Summary
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:33:49.895Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.2/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2021/07/02/2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210805-0008/",
               },
               {
                  name: "FEDORA-2021-78e501d62a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-18T02:06:16",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.2/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.openwall.com/lists/oss-security/2021/07/02/2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20210805-0008/",
            },
            {
               name: "FEDORA-2021-78e501d62a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-35042",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.2/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.2/releases/security/",
                  },
                  {
                     name: "https://www.openwall.com/lists/oss-security/2021/07/02/2",
                     refsource: "CONFIRM",
                     url: "https://www.openwall.com/lists/oss-security/2021/07/02/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20210805-0008/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20210805-0008/",
                  },
                  {
                     name: "FEDORA-2021-78e501d62a",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-35042",
      datePublished: "2021-07-02T09:54:11",
      dateReserved: "2021-06-18T00:00:00",
      dateUpdated: "2024-08-04T00:33:49.895Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-4315
Vulnerability from cvelistv5
Published
2013-09-16 19:00
Modified
2024-08-06 16:38
Severity ?
Summary
Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.
References
http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/54772third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2013-1521.htmlvendor-advisory, x_refsource_REDHAT
https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/x_refsource_CONFIRM
http://secunia.com/advisories/54828third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2013/dsa-2755vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T16:38:01.925Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "openSUSE-SU-2013:1541",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
               },
               {
                  name: "54772",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/54772",
               },
               {
                  name: "RHSA-2013:1521",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/",
               },
               {
                  name: "54828",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/54828",
               },
               {
                  name: "DSA-2755",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2013/dsa-2755",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-09-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-12-09T05:57:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "openSUSE-SU-2013:1541",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
            },
            {
               name: "54772",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/54772",
            },
            {
               name: "RHSA-2013:1521",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/",
            },
            {
               name: "54828",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/54828",
            },
            {
               name: "DSA-2755",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2013/dsa-2755",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2013-4315",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "openSUSE-SU-2013:1541",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
                  },
                  {
                     name: "54772",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/54772",
                  },
                  {
                     name: "RHSA-2013:1521",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/",
                  },
                  {
                     name: "54828",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/54828",
                  },
                  {
                     name: "DSA-2755",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2013/dsa-2755",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2013-4315",
      datePublished: "2013-09-16T19:00:00",
      dateReserved: "2013-06-12T00:00:00",
      dateUpdated: "2024-08-06T16:38:01.925Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-24584
Vulnerability from cvelistv5
Published
2020-09-01 12:36
Modified
2024-08-04 15:19
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T15:19:08.642Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  name: "USN-4479-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4479-1/",
               },
               {
                  name: "FEDORA-2020-94407454d7",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
               },
               {
                  name: "FEDORA-2020-6941c0a65b",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
               },
               {
                  name: "FEDORA-2020-9c6b391162",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-20T14:42:08",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               name: "USN-4479-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4479-1/",
            },
            {
               name: "FEDORA-2020-94407454d7",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
            },
            {
               name: "FEDORA-2020-6941c0a65b",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
            },
            {
               name: "FEDORA-2020-9c6b391162",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-24584",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "USN-4479-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4479-1/",
                  },
                  {
                     name: "FEDORA-2020-94407454d7",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
                  },
                  {
                     name: "FEDORA-2020-6941c0a65b",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
                  },
                  {
                     name: "FEDORA-2020-9c6b391162",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM",
                  },
                  {
                     name: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
                     refsource: "MISC",
                     url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
                     refsource: "MISC",
                     url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200918-0004/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-24584",
      datePublished: "2020-09-01T12:36:06",
      dateReserved: "2020-08-21T00:00:00",
      dateUpdated: "2024-08-04T15:19:08.642Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-5964
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 07:06
Severity ?
Summary
The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T07:06:34.982Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FEDORA-2015-1dd5bc998f",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
               },
               {
                  name: "RHSA-2015:1894",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
               },
               {
                  name: "DSA-3338",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3338",
               },
               {
                  name: "1033318",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1033318",
               },
               {
                  name: "RHSA-2015:1767",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
               },
               {
                  name: "USN-2720-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2720-1",
               },
               {
                  name: "RHSA-2015:1766",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
               },
               {
                  name: "76440",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76440",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-08-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-22T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FEDORA-2015-1dd5bc998f",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
            },
            {
               name: "RHSA-2015:1894",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
            },
            {
               name: "DSA-3338",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3338",
            },
            {
               name: "1033318",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1033318",
            },
            {
               name: "RHSA-2015:1767",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
            },
            {
               name: "USN-2720-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2720-1",
            },
            {
               name: "RHSA-2015:1766",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
            },
            {
               name: "76440",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76440",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-5964",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FEDORA-2015-1dd5bc998f",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
                  },
                  {
                     name: "RHSA-2015:1894",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
                  },
                  {
                     name: "DSA-3338",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3338",
                  },
                  {
                     name: "1033318",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1033318",
                  },
                  {
                     name: "RHSA-2015:1767",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
                  },
                  {
                     name: "USN-2720-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2720-1",
                  },
                  {
                     name: "RHSA-2015:1766",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
                  },
                  {
                     name: "76440",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76440",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
                     refsource: "MISC",
                     url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-5964",
      datePublished: "2015-08-24T14:00:00",
      dateReserved: "2015-08-07T00:00:00",
      dateUpdated: "2024-08-06T07:06:34.982Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36053
Vulnerability from cvelistv5
Published
2023-07-03 00:00
Modified
2024-08-02 16:37
Summary
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "debian_linux",
                  vendor: "debian",
                  versions: [
                     {
                        status: "affected",
                        version: "10.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fedora",
                  vendor: "fedoraproject",
                  versions: [
                     {
                        status: "affected",
                        version: "37",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        status: "affected",
                        version: "*",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-36053",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-22T16:03:28.124119Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-1333",
                        description: "CWE-1333 Inefficient Regular Expression Complexity",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:25:43.436Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:37:41.341Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.2/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/",
               },
               {
                  name: "[debian-lts-announce] 20230719 [SECURITY] [DLA 3500-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html",
               },
               {
                  name: "DSA-5465",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5465",
               },
               {
                  name: "FEDORA-2023-cc023fabb7",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/",
               },
               {
                  name: "FEDORA-2023-9d36d373f1",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/",
               },
               {
                  name: "FEDORA-2024-84fbbbb914",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-20T03:05:57.133777",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.2/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/",
            },
            {
               name: "[debian-lts-announce] 20230719 [SECURITY] [DLA 3500-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html",
            },
            {
               name: "DSA-5465",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2023/dsa-5465",
            },
            {
               name: "FEDORA-2023-cc023fabb7",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/",
            },
            {
               name: "FEDORA-2023-9d36d373f1",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/",
            },
            {
               name: "FEDORA-2024-84fbbbb914",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-36053",
      datePublished: "2023-07-03T00:00:00",
      dateReserved: "2023-06-20T00:00:00",
      dateUpdated: "2024-08-02T16:37:41.341Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2009-3695
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:38
Severity ?
Summary
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T06:38:30.278Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "36655",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/36655",
               },
               {
                  name: "django-emailfield-urlfield-dos(53727)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.djangoproject.com/weblog/2009/oct/09/security/",
               },
               {
                  name: "36948",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/36948",
               },
               {
                  name: "36968",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/36968",
               },
               {
                  name: "DSA-1905",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2009/dsa-1905",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457",
               },
               {
                  name: "[oss-security] 20091013 Re: Duplicate CVE assignment notification [was: CVE id request: django]",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/10/13/6",
               },
               {
                  name: "ADV-2009-2871",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2009/2871",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-10-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-16T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "36655",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/36655",
            },
            {
               name: "django-emailfield-urlfield-dos(53727)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.djangoproject.com/weblog/2009/oct/09/security/",
            },
            {
               name: "36948",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/36948",
            },
            {
               name: "36968",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/36968",
            },
            {
               name: "DSA-1905",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2009/dsa-1905",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457",
            },
            {
               name: "[oss-security] 20091013 Re: Duplicate CVE assignment notification [was: CVE id request: django]",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/10/13/6",
            },
            {
               name: "ADV-2009-2871",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2009/2871",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2009-3695",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "36655",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/36655",
                  },
                  {
                     name: "django-emailfield-urlfield-dos(53727)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727",
                  },
                  {
                     name: "http://www.djangoproject.com/weblog/2009/oct/09/security/",
                     refsource: "CONFIRM",
                     url: "http://www.djangoproject.com/weblog/2009/oct/09/security/",
                  },
                  {
                     name: "36948",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/36948",
                  },
                  {
                     name: "36968",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/36968",
                  },
                  {
                     name: "DSA-1905",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2009/dsa-1905",
                  },
                  {
                     name: "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/",
                     refsource: "MISC",
                     url: "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/",
                  },
                  {
                     name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457",
                     refsource: "CONFIRM",
                     url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457",
                  },
                  {
                     name: "[oss-security] 20091013 Re: Duplicate CVE assignment notification [was: CVE id request: django]",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/10/13/6",
                  },
                  {
                     name: "ADV-2009-2871",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2009/2871",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2009-3695",
      datePublished: "2009-10-13T10:00:00",
      dateReserved: "2009-10-13T00:00:00",
      dateUpdated: "2024-08-07T06:38:30.278Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-0473
Vulnerability from cvelistv5
Published
2014-04-23 14:00
Modified
2024-08-06 09:20
Severity ?
Summary
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
References
http://www.ubuntu.com/usn/USN-2169-1vendor-advisory, x_refsource_UBUNTU
https://www.djangoproject.com/weblog/2014/apr/21/security/x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-0457.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-2934vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2014-0456.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:20:18.401Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-2169-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2169-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
               },
               {
                  name: "RHSA-2014:0457",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
               },
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "DSA-2934",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-2934",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "RHSA-2014:0456",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-04-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               name: "USN-2169-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2169-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
            },
            {
               name: "RHSA-2014:0457",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
            },
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "DSA-2934",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-2934",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "RHSA-2014:0456",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-0473",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-2169-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2169-1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
                  },
                  {
                     name: "RHSA-2014:0457",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
                  },
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "DSA-2934",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-2934",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "RHSA-2014:0456",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-0473",
      datePublished: "2014-04-23T14:00:00",
      dateReserved: "2013-12-19T00:00:00",
      dateUpdated: "2024-08-06T09:20:18.401Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-0480
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
Summary
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
References
https://www.djangoproject.com/weblog/2014/aug/20/security/x_refsource_CONFIRM
http://www.securityfocus.com/bid/69425vdb-entry, x_refsource_BID
http://secunia.com/advisories/61276third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2014/dsa-3010vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/59782third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:20:18.389Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
               },
               {
                  name: "69425",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/69425",
               },
               {
                  name: "61276",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61276",
               },
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "DSA-3010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-3010",
               },
               {
                  name: "59782",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59782",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
            },
            {
               name: "69425",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/69425",
            },
            {
               name: "61276",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61276",
            },
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "DSA-3010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-3010",
            },
            {
               name: "59782",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59782",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-0480",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                  },
                  {
                     name: "69425",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/69425",
                  },
                  {
                     name: "61276",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61276",
                  },
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "DSA-3010",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-3010",
                  },
                  {
                     name: "59782",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59782",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-0480",
      datePublished: "2014-08-26T14:00:00",
      dateReserved: "2013-12-19T00:00:00",
      dateUpdated: "2024-08-06T09:20:18.389Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-0482
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
Summary
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
References
https://www.djangoproject.com/weblog/2014/aug/20/security/x_refsource_CONFIRM
http://secunia.com/advisories/61276third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2014/dsa-3010vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/59782third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:20:18.469Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
               },
               {
                  name: "61276",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61276",
               },
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "DSA-3010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-3010",
               },
               {
                  name: "59782",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59782",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
            },
            {
               name: "61276",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61276",
            },
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "DSA-3010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-3010",
            },
            {
               name: "59782",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59782",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-0482",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                  },
                  {
                     name: "61276",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61276",
                  },
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "DSA-3010",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-3010",
                  },
                  {
                     name: "59782",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59782",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-0482",
      datePublished: "2014-08-26T14:00:00",
      dateReserved: "2013-12-19T00:00:00",
      dateUpdated: "2024-08-06T09:20:18.469Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-2316
Vulnerability from cvelistv5
Published
2015-03-25 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:16.424Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-2539-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2539-1",
               },
               {
                  name: "73322",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/73322",
               },
               {
                  name: "FEDORA-2015-5766",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
               },
               {
                  name: "openSUSE-SU-2015:0643",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-03-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-30T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-2539-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2539-1",
            },
            {
               name: "73322",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/73322",
            },
            {
               name: "FEDORA-2015-5766",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
            },
            {
               name: "openSUSE-SU-2015:0643",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2316",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-2539-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2539-1",
                  },
                  {
                     name: "73322",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/73322",
                  },
                  {
                     name: "FEDORA-2015-5766",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
                  },
                  {
                     name: "openSUSE-SU-2015:0643",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2316",
      datePublished: "2015-03-25T14:00:00",
      dateReserved: "2015-03-17T00:00:00",
      dateUpdated: "2024-08-06T05:10:16.424Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-19118
Vulnerability from cvelistv5
Published
2019-12-02 13:16
Modified
2024-08-05 02:09
Severity ?
Summary
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:09:39.366Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  name: "[oss-security] 20191202 Django 2.2.8 and 2.1.15: CVE-2019-19118: Privilege escalation in the Django admin.",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/12/02/1",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20191217-0003/",
               },
               {
                  name: "FEDORA-2019-adc8990386",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-01T01:06:12",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               name: "[oss-security] 20191202 Django 2.2.8 and 2.1.15: CVE-2019-19118: Privilege escalation in the Django admin.",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/12/02/1",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20191217-0003/",
            },
            {
               name: "FEDORA-2019-adc8990386",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-19118",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "[oss-security] 20191202 Django 2.2.8 and 2.1.15: CVE-2019-19118: Privilege escalation in the Django admin.",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/12/02/1",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20191217-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20191217-0003/",
                  },
                  {
                     name: "FEDORA-2019-adc8990386",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-19118",
      datePublished: "2019-12-02T13:16:34",
      dateReserved: "2019-11-19T00:00:00",
      dateUpdated: "2024-08-05T02:09:39.366Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-23336
Vulnerability from cvelistv5
Published
2021-02-15 12:15
Modified
2024-09-16 18:55
Summary
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
References
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://github.com/python/cpython/pull/24297
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
http://www.openwall.com/lists/oss-security/2021/02/19/4mailing-list
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.htmlmailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/vendor-advisory
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3Emailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/vendor-advisory
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.htmlmailing-list
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.htmlmailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/vendor-advisory
https://security.gentoo.org/glsa/202104-04vendor-advisory
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3Emailing-list
http://www.openwall.com/lists/oss-security/2021/05/01/2mailing-list
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3Emailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/vendor-advisory
https://www.oracle.com/security-alerts/cpuApr2021.html
https://security.netapp.com/advisory/ntap-20210326-0004/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.htmlmailing-list
Impacted products
Vendor Product Version
n/a python/cpython Version: 0   < unspecified
Version: unspecified   < 3.6.13
Version: 3.7.0   < unspecified
Version: unspecified   < 3.7.10
Version: 3.8.0   < unspecified
Version: unspecified   < 3.8.8
Version: 3.9.0   < unspecified
Version: unspecified   < 3.9.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T19:05:55.612Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/python/cpython/pull/24297",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
               },
               {
                  name: "[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2021/02/19/4",
               },
               {
                  name: "[debian-lts-announce] 20210219 [SECURITY] [DLA 2569-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
               },
               {
                  name: "FEDORA-2021-7547ad987f",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
               },
               {
                  name: "FEDORA-2021-f4fd9372c7",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
               },
               {
                  name: "FEDORA-2021-3352c1c802",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
               },
               {
                  name: "FEDORA-2021-7d3a9004e2",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
               },
               {
                  name: "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
               },
               {
                  name: "FEDORA-2021-907f3bacae",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
               },
               {
                  name: "FEDORA-2021-7c1bb32d13",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
               },
               {
                  name: "FEDORA-2021-b1843407ca",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
               },
               {
                  name: "FEDORA-2021-2897f5366c",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
               },
               {
                  name: "FEDORA-2021-b326fcb83f",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
               },
               {
                  name: "FEDORA-2021-1bb399a5af",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
               },
               {
                  name: "FEDORA-2021-ef83e8525a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
               },
               {
                  name: "FEDORA-2021-b76ede8f4d",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
               },
               {
                  name: "FEDORA-2021-309bc2e727",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
               },
               {
                  name: "FEDORA-2021-5a09621ebb",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
               },
               {
                  name: "FEDORA-2021-e22bb0e548",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
               },
               {
                  name: "FEDORA-2021-e525e48886",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
               },
               {
                  name: "[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
               },
               {
                  name: "[debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
               },
               {
                  name: "FEDORA-2021-b6b6093b3a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
               },
               {
                  name: "GLSA-202104-04",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202104-04",
               },
               {
                  name: "[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
               },
               {
                  name: "[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2021/05/01/2",
               },
               {
                  name: "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
               },
               {
                  name: "FEDORA-2021-98720f3785",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
               },
               {
                  name: "FEDORA-2021-12df7f7382",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210326-0004/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com//security-alerts/cpujul2021.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2022.html",
               },
               {
                  name: "[debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "python/cpython",
               vendor: "n/a",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.6.13",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "3.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.7.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "3.8.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.8.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "3.9.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.9.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Snyk Security Team",
            },
         ],
         datePublic: "2021-02-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitCodeMaturity: "PROOF_OF_CONCEPT",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  remediationLevel: "UNAVAILABLE",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.6,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Web Cache Poisoning",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-20T21:06:13.958312",
            orgId: "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
            shortName: "snyk",
         },
         references: [
            {
               url: "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
            },
            {
               url: "https://github.com/python/cpython/pull/24297",
            },
            {
               url: "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
            },
            {
               name: "[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2021/02/19/4",
            },
            {
               name: "[debian-lts-announce] 20210219 [SECURITY] [DLA 2569-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
            },
            {
               name: "FEDORA-2021-7547ad987f",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
            },
            {
               name: "FEDORA-2021-f4fd9372c7",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
            },
            {
               name: "FEDORA-2021-3352c1c802",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
            },
            {
               name: "FEDORA-2021-7d3a9004e2",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
            },
            {
               name: "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
            },
            {
               name: "FEDORA-2021-907f3bacae",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
            },
            {
               name: "FEDORA-2021-7c1bb32d13",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
            },
            {
               name: "FEDORA-2021-b1843407ca",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
            },
            {
               name: "FEDORA-2021-2897f5366c",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
            },
            {
               name: "FEDORA-2021-b326fcb83f",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
            },
            {
               name: "FEDORA-2021-1bb399a5af",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
            },
            {
               name: "FEDORA-2021-ef83e8525a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
            },
            {
               name: "FEDORA-2021-b76ede8f4d",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
            },
            {
               name: "FEDORA-2021-309bc2e727",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
            },
            {
               name: "FEDORA-2021-5a09621ebb",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
            },
            {
               name: "FEDORA-2021-e22bb0e548",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
            },
            {
               name: "FEDORA-2021-e525e48886",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
            },
            {
               name: "[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
            },
            {
               name: "[debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
            },
            {
               name: "FEDORA-2021-b6b6093b3a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
            },
            {
               name: "GLSA-202104-04",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://security.gentoo.org/glsa/202104-04",
            },
            {
               name: "[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
            },
            {
               name: "[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2021/05/01/2",
            },
            {
               name: "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
            },
            {
               name: "FEDORA-2021-98720f3785",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
            },
            {
               name: "FEDORA-2021-12df7f7382",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20210326-0004/",
            },
            {
               url: "https://www.oracle.com//security-alerts/cpujul2021.html",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpujan2022.html",
            },
            {
               name: "[debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
            },
         ],
         title: "Web Cache Poisoning",
      },
   },
   cveMetadata: {
      assignerOrgId: "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
      assignerShortName: "snyk",
      cveId: "CVE-2021-23336",
      datePublished: "2021-02-15T12:15:20.788790Z",
      dateReserved: "2021-01-08T00:00:00",
      dateUpdated: "2024-09-16T18:55:19.315Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-2513
Vulnerability from cvelistv5
Published
2016-04-08 15:00
Modified
2024-08-05 23:32
Severity ?
Summary
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T23:32:20.440Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2016:0506",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab",
               },
               {
                  name: "1035152",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1035152",
               },
               {
                  name: "RHSA-2016:0504",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
               },
               {
                  name: "DSA-3544",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2016/dsa-3544",
               },
               {
                  name: "RHSA-2016:0502",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
               },
               {
                  name: "USN-2915-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2915-3",
               },
               {
                  name: "83878",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/83878",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
               },
               {
                  name: "USN-2915-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2915-2",
               },
               {
                  name: "RHSA-2016:0505",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
               },
               {
                  name: "USN-2915-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2915-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-03-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-07T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2016:0506",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab",
            },
            {
               name: "1035152",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1035152",
            },
            {
               name: "RHSA-2016:0504",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
            },
            {
               name: "DSA-3544",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2016/dsa-3544",
            },
            {
               name: "RHSA-2016:0502",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
            },
            {
               name: "USN-2915-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2915-3",
            },
            {
               name: "83878",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/83878",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
            },
            {
               name: "USN-2915-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2915-2",
            },
            {
               name: "RHSA-2016:0505",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
            },
            {
               name: "USN-2915-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2915-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-2513",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2016:0506",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
                  },
                  {
                     name: "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab",
                  },
                  {
                     name: "1035152",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1035152",
                  },
                  {
                     name: "RHSA-2016:0504",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
                  },
                  {
                     name: "DSA-3544",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2016/dsa-3544",
                  },
                  {
                     name: "RHSA-2016:0502",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
                  },
                  {
                     name: "USN-2915-3",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2915-3",
                  },
                  {
                     name: "83878",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/83878",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                  },
                  {
                     name: "USN-2915-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2915-2",
                  },
                  {
                     name: "RHSA-2016:0505",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
                  },
                  {
                     name: "USN-2915-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2915-1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-2513",
      datePublished: "2016-04-08T15:00:00",
      dateReserved: "2016-02-19T00:00:00",
      dateUpdated: "2024-08-05T23:32:20.440Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-0221
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
Summary
The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T04:03:10.378Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "62718",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62718",
               },
               {
                  name: "FEDORA-2015-0804",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
               },
               {
                  name: "USN-2469-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-2469-1",
               },
               {
                  name: "MDVSA-2015:036",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
               },
               {
                  name: "FEDORA-2015-0790",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
               },
               {
                  name: "62285",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62285",
               },
               {
                  name: "openSUSE-SU-2015:1598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
               },
               {
                  name: "openSUSE-SU-2015:0643",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
               },
               {
                  name: "62309",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62309",
               },
               {
                  name: "MDVSA-2015:109",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://advisories.mageia.org/MGASA-2015-0026.html",
               },
               {
                  name: "FEDORA-2015-0714",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-20T16:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "62718",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62718",
            },
            {
               name: "FEDORA-2015-0804",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
            },
            {
               name: "USN-2469-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-2469-1",
            },
            {
               name: "MDVSA-2015:036",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
            },
            {
               name: "FEDORA-2015-0790",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
            },
            {
               name: "62285",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62285",
            },
            {
               name: "openSUSE-SU-2015:1598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
            },
            {
               name: "openSUSE-SU-2015:0643",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
            },
            {
               name: "62309",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62309",
            },
            {
               name: "MDVSA-2015:109",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://advisories.mageia.org/MGASA-2015-0026.html",
            },
            {
               name: "FEDORA-2015-0714",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2015-0221",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "62718",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62718",
                  },
                  {
                     name: "FEDORA-2015-0804",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
                  },
                  {
                     name: "USN-2469-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-2469-1",
                  },
                  {
                     name: "MDVSA-2015:036",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
                  },
                  {
                     name: "FEDORA-2015-0790",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
                  },
                  {
                     name: "62285",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62285",
                  },
                  {
                     name: "openSUSE-SU-2015:1598",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                  },
                  {
                     name: "openSUSE-SU-2015:0643",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
                  },
                  {
                     name: "62309",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62309",
                  },
                  {
                     name: "MDVSA-2015:109",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
                  },
                  {
                     name: "http://advisories.mageia.org/MGASA-2015-0026.html",
                     refsource: "CONFIRM",
                     url: "http://advisories.mageia.org/MGASA-2015-0026.html",
                  },
                  {
                     name: "FEDORA-2015-0714",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-0221",
      datePublished: "2015-01-16T16:00:00",
      dateReserved: "2014-11-18T00:00:00",
      dateUpdated: "2024-08-06T04:03:10.378Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-4140
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
Summary
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T00:01:51.120Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "openSUSE-SU-2012:0653",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "https://hermes.opensuse.org/messages/14700881",
               },
               {
                  name: "DSA-2332",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2332",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
               },
               {
                  name: "46614",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/46614",
               },
               {
                  name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/11/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
               },
               {
                  name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/13/2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/09/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-09-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-17T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "openSUSE-SU-2012:0653",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "https://hermes.opensuse.org/messages/14700881",
            },
            {
               name: "DSA-2332",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2332",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
            },
            {
               name: "46614",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/46614",
            },
            {
               name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/11/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
            },
            {
               name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/13/2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/09/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-4140",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "openSUSE-SU-2012:0653",
                     refsource: "SUSE",
                     url: "https://hermes.opensuse.org/messages/14700881",
                  },
                  {
                     name: "DSA-2332",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2011/dsa-2332",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                  },
                  {
                     name: "46614",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/46614",
                  },
                  {
                     name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/11/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                  },
                  {
                     name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/13/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/09/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/09/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-4140",
      datePublished: "2011-10-19T10:00:00",
      dateReserved: "2011-10-19T00:00:00",
      dateUpdated: "2024-08-07T00:01:51.120Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-34265
Vulnerability from cvelistv5
Published
2022-07-04 00:00
Modified
2025-02-13 16:32
Severity ?
Summary
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:07:16.138Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220818-0006/",
               },
               {
                  name: "DSA-5254",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2022/dsa-5254",
               },
               {
                  name: "FEDORA-2023-8fed428c5e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
               },
               {
                  name: "FEDORA-2023-a53ab7c969",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-28T03:06:14.431Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20220818-0006/",
            },
            {
               name: "DSA-5254",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2022/dsa-5254",
            },
            {
               name: "FEDORA-2023-8fed428c5e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
            },
            {
               name: "FEDORA-2023-a53ab7c969",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-34265",
      datePublished: "2022-07-04T00:00:00.000Z",
      dateReserved: "2022-06-21T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:32:45.198Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-1418
Vulnerability from cvelistv5
Published
2014-05-16 15:00
Modified
2024-08-06 09:42
Severity ?
Summary
Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.
References
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-2934vendor-advisory, x_refsource_DEBIAN
http://ubuntu.com/usn/usn-2212-1vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://www.openwall.com/lists/oss-security/2014/05/15/3mailing-list, x_refsource_MLIST
https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2014/05/14/10mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:42:35.452Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "DSA-2934",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-2934",
               },
               {
                  name: "USN-2212-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-2212-1",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
               },
               {
                  name: "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-05-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
            shortName: "canonical",
         },
         references: [
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "DSA-2934",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-2934",
            },
            {
               name: "USN-2212-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-2212-1",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
            },
            {
               name: "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@ubuntu.com",
               ID: "CVE-2014-1418",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "DSA-2934",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-2934",
                  },
                  {
                     name: "USN-2212-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-2212-1",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
                  },
                  {
                     name: "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
      assignerShortName: "canonical",
      cveId: "CVE-2014-1418",
      datePublished: "2014-05-16T15:00:00",
      dateReserved: "2014-01-13T00:00:00",
      dateUpdated: "2024-08-06T09:42:35.452Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-6975
Vulnerability from cvelistv5
Published
2019-02-11 13:00
Modified
2024-08-04 20:38
Severity ?
Summary
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:38:32.322Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  name: "106964",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/106964",
               },
               {
                  name: "USN-3890-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3890-1/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2019/02/11/1",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ",
               },
               {
                  name: "FEDORA-2019-5ad2149e99",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
               },
               {
                  name: "FEDORA-2019-f528d75a69",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/",
               },
               {
                  name: "DSA-4476",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4476",
               },
               {
                  name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Jul/10",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2019-02-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-07-08T14:06:13",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               name: "106964",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/106964",
            },
            {
               name: "USN-3890-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3890-1/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.openwall.com/lists/oss-security/2019/02/11/1",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ",
            },
            {
               name: "FEDORA-2019-5ad2149e99",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
            },
            {
               name: "FEDORA-2019-f528d75a69",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/",
            },
            {
               name: "DSA-4476",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4476",
            },
            {
               name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Jul/10",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-6975",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/",
                     refsource: "MISC",
                     url: "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "106964",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/106964",
                  },
                  {
                     name: "USN-3890-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3890-1/",
                  },
                  {
                     name: "https://www.openwall.com/lists/oss-security/2019/02/11/1",
                     refsource: "MISC",
                     url: "https://www.openwall.com/lists/oss-security/2019/02/11/1",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ",
                  },
                  {
                     name: "FEDORA-2019-5ad2149e99",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
                  },
                  {
                     name: "FEDORA-2019-f528d75a69",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/",
                  },
                  {
                     name: "DSA-4476",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4476",
                  },
                  {
                     name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Jul/10",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-6975",
      datePublished: "2019-02-11T13:00:00",
      dateReserved: "2019-01-26T00:00:00",
      dateUpdated: "2024-08-04T20:38:32.322Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-2241
Vulnerability from cvelistv5
Published
2015-03-12 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:15.804Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "73095",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/73095",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://code.djangoproject.com/ticket/24461",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/",
               },
               {
                  name: "MDVSA-2015:109",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-03-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-30T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "73095",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/73095",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://code.djangoproject.com/ticket/24461",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/",
            },
            {
               name: "MDVSA-2015:109",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2241",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "73095",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/73095",
                  },
                  {
                     name: "https://code.djangoproject.com/ticket/24461",
                     refsource: "CONFIRM",
                     url: "https://code.djangoproject.com/ticket/24461",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/",
                  },
                  {
                     name: "MDVSA-2015:109",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2241",
      datePublished: "2015-03-12T14:00:00",
      dateReserved: "2015-03-09T00:00:00",
      dateUpdated: "2024-08-06T05:10:15.804Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-5143
Vulnerability from cvelistv5
Published
2015-07-14 17:00
Modified
2024-08-06 06:32
Severity ?
Summary
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T06:32:32.963Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FEDORA-2015-1dd5bc998f",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
               },
               {
                  name: "GLSA-201510-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201510-06",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
               },
               {
                  name: "openSUSE-SU-2015:1802",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
               },
               {
                  name: "openSUSE-SU-2015:1813",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
               },
               {
                  name: "DSA-3305",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3305",
               },
               {
                  name: "RHSA-2015:1678",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1678.html",
               },
               {
                  name: "75666",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75666",
               },
               {
                  name: "RHSA-2015:1686",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1686.html",
               },
               {
                  name: "USN-2671-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2671-1",
               },
               {
                  name: "1032820",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032820",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-07-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-21T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FEDORA-2015-1dd5bc998f",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
            },
            {
               name: "GLSA-201510-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201510-06",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
            },
            {
               name: "openSUSE-SU-2015:1802",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
            },
            {
               name: "openSUSE-SU-2015:1813",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
            },
            {
               name: "DSA-3305",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3305",
            },
            {
               name: "RHSA-2015:1678",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1678.html",
            },
            {
               name: "75666",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75666",
            },
            {
               name: "RHSA-2015:1686",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1686.html",
            },
            {
               name: "USN-2671-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2671-1",
            },
            {
               name: "1032820",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032820",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-5143",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FEDORA-2015-1dd5bc998f",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
                  },
                  {
                     name: "GLSA-201510-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201510-06",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
                  },
                  {
                     name: "openSUSE-SU-2015:1802",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
                  },
                  {
                     name: "openSUSE-SU-2015:1813",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
                  },
                  {
                     name: "DSA-3305",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3305",
                  },
                  {
                     name: "RHSA-2015:1678",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1678.html",
                  },
                  {
                     name: "75666",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75666",
                  },
                  {
                     name: "RHSA-2015:1686",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1686.html",
                  },
                  {
                     name: "USN-2671-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2671-1",
                  },
                  {
                     name: "1032820",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032820",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-5143",
      datePublished: "2015-07-14T17:00:00",
      dateReserved: "2015-06-29T00:00:00",
      dateUpdated: "2024-08-06T06:32:32.963Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-28658
Vulnerability from cvelistv5
Published
2021-04-06 14:51
Modified
2024-08-03 21:47
Severity ?
Summary
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T21:47:33.200Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.1/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/",
               },
               {
                  name: "[debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html",
               },
               {
                  name: "FEDORA-2021-01044b8a59",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210528-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-28T09:06:11",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.1/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/",
            },
            {
               name: "[debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html",
            },
            {
               name: "FEDORA-2021-01044b8a59",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20210528-0001/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-28658",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/3.1/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.1/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU",
                     refsource: "MISC",
                     url: "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/",
                  },
                  {
                     name: "[debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html",
                  },
                  {
                     name: "FEDORA-2021-01044b8a59",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20210528-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20210528-0001/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-28658",
      datePublished: "2021-04-06T14:51:43",
      dateReserved: "2021-03-17T00:00:00",
      dateUpdated: "2024-08-03T21:47:33.200Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-9014
Vulnerability from cvelistv5
Published
2016-12-09 20:00
Modified
2024-08-06 02:35
Severity ?
Summary
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:02.332Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
               },
               {
                  name: "FEDORA-2016-d4571bf555",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
               },
               {
                  name: "94068",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94068",
               },
               {
                  name: "DSA-3835",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2017/dsa-3835",
               },
               {
                  name: "USN-3115-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-3115-1",
               },
               {
                  name: "1037159",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1037159",
               },
               {
                  name: "FEDORA-2016-3eb5a55123",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-11-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-03T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
            },
            {
               name: "FEDORA-2016-d4571bf555",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
            },
            {
               name: "94068",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94068",
            },
            {
               name: "DSA-3835",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2017/dsa-3835",
            },
            {
               name: "USN-3115-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-3115-1",
            },
            {
               name: "1037159",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1037159",
            },
            {
               name: "FEDORA-2016-3eb5a55123",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-9014",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
                  },
                  {
                     name: "FEDORA-2016-d4571bf555",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
                  },
                  {
                     name: "94068",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94068",
                  },
                  {
                     name: "DSA-3835",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2017/dsa-3835",
                  },
                  {
                     name: "USN-3115-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-3115-1",
                  },
                  {
                     name: "1037159",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1037159",
                  },
                  {
                     name: "FEDORA-2016-3eb5a55123",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-9014",
      datePublished: "2016-12-09T20:00:00",
      dateReserved: "2016-10-25T00:00:00",
      dateUpdated: "2024-08-06T02:35:02.332Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-2512
Vulnerability from cvelistv5
Published
2016-04-08 15:00
Modified
2024-08-05 23:32
Severity ?
Summary
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T23:32:20.686Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2016:0506",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
               },
               {
                  name: "1035152",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1035152",
               },
               {
                  name: "83879",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/83879",
               },
               {
                  name: "RHSA-2016:0504",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
               },
               {
                  name: "DSA-3544",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2016/dsa-3544",
               },
               {
                  name: "RHSA-2016:0502",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
               },
               {
                  name: "USN-2915-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2915-3",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
               },
               {
                  name: "USN-2915-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2915-2",
               },
               {
                  name: "RHSA-2016:0505",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
               },
               {
                  name: "USN-2915-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2915-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-03-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\\@attacker.com.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-07T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2016:0506",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
            },
            {
               name: "1035152",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1035152",
            },
            {
               name: "83879",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/83879",
            },
            {
               name: "RHSA-2016:0504",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
            },
            {
               name: "DSA-3544",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2016/dsa-3544",
            },
            {
               name: "RHSA-2016:0502",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
            },
            {
               name: "USN-2915-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2915-3",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
            },
            {
               name: "USN-2915-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2915-2",
            },
            {
               name: "RHSA-2016:0505",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
            },
            {
               name: "USN-2915-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2915-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-2512",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\\@attacker.com.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2016:0506",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
                  },
                  {
                     name: "1035152",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1035152",
                  },
                  {
                     name: "83879",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/83879",
                  },
                  {
                     name: "RHSA-2016:0504",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
                  },
                  {
                     name: "DSA-3544",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2016/dsa-3544",
                  },
                  {
                     name: "RHSA-2016:0502",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
                  },
                  {
                     name: "USN-2915-3",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2915-3",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                  },
                  {
                     name: "USN-2915-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2915-2",
                  },
                  {
                     name: "RHSA-2016:0505",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
                  },
                  {
                     name: "USN-2915-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2915-1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
                  },
                  {
                     name: "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-2512",
      datePublished: "2016-04-08T15:00:00",
      dateReserved: "2016-02-19T00:00:00",
      dateUpdated: "2024-08-05T23:32:20.686Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-12308
Vulnerability from cvelistv5
Published
2019-06-03 16:24
Modified
2024-08-04 23:17
Severity ?
Summary
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
References
https://docs.djangoproject.com/en/dev/releases/security/x_refsource_MISC
http://www.openwall.com/lists/oss-security/2019/06/03/2mailing-list, x_refsource_MLIST
https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8x_refsource_MISC
https://docs.djangoproject.com/en/dev/releases/1.11.21/x_refsource_CONFIRM
https://docs.djangoproject.com/en/dev/releases/2.1.9/x_refsource_CONFIRM
https://docs.djangoproject.com/en/dev/releases/2.2.2/x_refsource_CONFIRM
https://www.djangoproject.com/weblog/2019/jun/03/security-releases/x_refsource_CONFIRM
http://www.securityfocus.com/bid/108559vdb-entry, x_refsource_BID
https://lists.debian.org/debian-lts-announce/2019/06/msg00001.htmlmailing-list, x_refsource_MLIST
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/vendor-advisory, x_refsource_FEDORA
https://usn.ubuntu.com/4043-1/vendor-advisory, x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2019/07/msg00001.htmlmailing-list, x_refsource_MLIST
https://www.debian.org/security/2019/dsa-4476vendor-advisory, x_refsource_DEBIAN
https://seclists.org/bugtraq/2019/Jul/10mailing-list, x_refsource_BUGTRAQ
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.htmlvendor-advisory, x_refsource_SUSE
https://security.gentoo.org/glsa/202004-17vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T23:17:39.619Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  name: "[oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/06/03/2",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/1.11.21/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/2.1.9/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/2.2.2/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/",
               },
               {
                  name: "108559",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108559",
               },
               {
                  name: "[debian-lts-announce] 20190605 [SECURITY] [DLA 1814-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html",
               },
               {
                  name: "FEDORA-2019-57a4324120",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/",
               },
               {
                  name: "USN-4043-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4043-1/",
               },
               {
                  name: "[debian-lts-announce] 20190701 [SECURITY] [DLA 1842-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html",
               },
               {
                  name: "DSA-4476",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4476",
               },
               {
                  name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Jul/10",
               },
               {
                  name: "openSUSE-SU-2019:1839",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
               },
               {
                  name: "openSUSE-SU-2019:1872",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-01T01:06:15",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               name: "[oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/06/03/2",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/1.11.21/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/2.1.9/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/2.2.2/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/",
            },
            {
               name: "108559",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108559",
            },
            {
               name: "[debian-lts-announce] 20190605 [SECURITY] [DLA 1814-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html",
            },
            {
               name: "FEDORA-2019-57a4324120",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/",
            },
            {
               name: "USN-4043-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4043-1/",
            },
            {
               name: "[debian-lts-announce] 20190701 [SECURITY] [DLA 1842-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html",
            },
            {
               name: "DSA-4476",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4476",
            },
            {
               name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Jul/10",
            },
            {
               name: "openSUSE-SU-2019:1839",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
            },
            {
               name: "openSUSE-SU-2019:1872",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-12308",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "[oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/06/03/2",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/GEbHU7YoVz8",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/GEbHU7YoVz8",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/1.11.21/",
                     refsource: "CONFIRM",
                     url: "https://docs.djangoproject.com/en/dev/releases/1.11.21/",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/2.1.9/",
                     refsource: "CONFIRM",
                     url: "https://docs.djangoproject.com/en/dev/releases/2.1.9/",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/2.2.2/",
                     refsource: "CONFIRM",
                     url: "https://docs.djangoproject.com/en/dev/releases/2.2.2/",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/",
                  },
                  {
                     name: "108559",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108559",
                  },
                  {
                     name: "[debian-lts-announce] 20190605 [SECURITY] [DLA 1814-1] python-django security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html",
                  },
                  {
                     name: "FEDORA-2019-57a4324120",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/",
                  },
                  {
                     name: "USN-4043-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4043-1/",
                  },
                  {
                     name: "[debian-lts-announce] 20190701 [SECURITY] [DLA 1842-1] python-django security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html",
                  },
                  {
                     name: "DSA-4476",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4476",
                  },
                  {
                     name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Jul/10",
                  },
                  {
                     name: "openSUSE-SU-2019:1839",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
                  },
                  {
                     name: "openSUSE-SU-2019:1872",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-12308",
      datePublished: "2019-06-03T16:24:31",
      dateReserved: "2019-05-23T00:00:00",
      dateUpdated: "2024-08-04T23:17:39.619Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-3498
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-04 19:12
Severity ?
Summary
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:12:09.465Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  name: "USN-3851-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3851-1/",
               },
               {
                  name: "106453",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/106453",
               },
               {
                  name: "[debian-lts-announce] 20190106 [SECURITY] [DLA 1629-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/",
               },
               {
                  name: "DSA-4363",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4363",
               },
               {
                  name: "FEDORA-2019-5ad2149e99",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2019-01-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-20T22:06:03",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               name: "USN-3851-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3851-1/",
            },
            {
               name: "106453",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/106453",
            },
            {
               name: "[debian-lts-announce] 20190106 [SECURITY] [DLA 1629-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/",
            },
            {
               name: "DSA-4363",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4363",
            },
            {
               name: "FEDORA-2019-5ad2149e99",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-3498",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "USN-3851-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3851-1/",
                  },
                  {
                     name: "106453",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/106453",
                  },
                  {
                     name: "[debian-lts-announce] 20190106 [SECURITY] [DLA 1629-1] python-django security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/",
                     refsource: "MISC",
                     url: "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/",
                  },
                  {
                     name: "DSA-4363",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4363",
                  },
                  {
                     name: "FEDORA-2019-5ad2149e99",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-3498",
      datePublished: "2019-01-09T22:00:00",
      dateReserved: "2019-01-01T00:00:00",
      dateUpdated: "2024-08-04T19:12:09.465Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-4534
Vulnerability from cvelistv5
Published
2011-01-10 19:18
Modified
2024-08-07 03:51
Severity ?
Summary
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
References
http://www.securityfocus.com/bid/45562vdb-entry, x_refsource_BID
http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/x_refsource_MISC
http://www.openwall.com/lists/oss-security/2010/12/23/4mailing-list, x_refsource_MLIST
http://www.securityfocus.com/archive/1/515446mailing-list, x_refsource_BUGTRAQ
http://www.ubuntu.com/usn/USN-1040-1vendor-advisory, x_refsource_UBUNTU
http://www.openwall.com/lists/oss-security/2011/01/03/5mailing-list, x_refsource_MLIST
http://secunia.com/advisories/42913third-party-advisory, x_refsource_SECUNIA
http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/x_refsource_MISC
http://code.djangoproject.com/changeset/15031x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0048vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0098vdb-entry, x_refsource_VUPEN
http://www.djangoproject.com/weblog/2010/dec/22/security/x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.htmlvendor-advisory, x_refsource_FEDORA
https://bugzilla.redhat.com/show_bug.cgi?id=665373x_refsource_CONFIRM
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.htmlmailing-list, x_refsource_FULLDISC
http://secunia.com/advisories/42715third-party-advisory, x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/42827third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:51:17.373Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "45562",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/45562",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/",
               },
               {
                  name: "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
               },
               {
                  name: "20101223 Django admin list filter data extraction / leakage",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/515446",
               },
               {
                  name: "USN-1040-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1040-1",
               },
               {
                  name: "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
               },
               {
                  name: "42913",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/42913",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://code.djangoproject.com/changeset/15031",
               },
               {
                  name: "ADV-2011-0048",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0048",
               },
               {
                  name: "ADV-2011-0098",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0098",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
               },
               {
                  name: "FEDORA-2011-0096",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
               },
               {
                  name: "20101223 Django admin list filter data extraction / leakage",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html",
               },
               {
                  name: "42715",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/42715",
               },
               {
                  name: "FEDORA-2011-0120",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
               },
               {
                  name: "42827",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/42827",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-12-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2011-01-19T10:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "45562",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/45562",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/",
            },
            {
               name: "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
            },
            {
               name: "20101223 Django admin list filter data extraction / leakage",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/515446",
            },
            {
               name: "USN-1040-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1040-1",
            },
            {
               name: "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
            },
            {
               name: "42913",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/42913",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://code.djangoproject.com/changeset/15031",
            },
            {
               name: "ADV-2011-0048",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0048",
            },
            {
               name: "ADV-2011-0098",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0098",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
            },
            {
               name: "FEDORA-2011-0096",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
            },
            {
               name: "20101223 Django admin list filter data extraction / leakage",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html",
            },
            {
               name: "42715",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/42715",
            },
            {
               name: "FEDORA-2011-0120",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
            },
            {
               name: "42827",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/42827",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-4534",
      datePublished: "2011-01-10T19:18:00",
      dateReserved: "2010-12-09T00:00:00",
      dateUpdated: "2024-08-07T03:51:17.373Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-14574
Vulnerability from cvelistv5
Published
2018-08-03 17:00
Modified
2024-08-05 09:29
Severity ?
Summary
django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
References
https://www.djangoproject.com/weblog/2018/aug/01/security-releases/x_refsource_CONFIRM
https://usn.ubuntu.com/3726-1/vendor-advisory, x_refsource_UBUNTU
https://www.debian.org/security/2018/dsa-4264vendor-advisory, x_refsource_DEBIAN
http://www.securitytracker.com/id/1041403vdb-entry, x_refsource_SECTRACK
https://access.redhat.com/errata/RHSA-2019:0265vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/104970vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T09:29:51.795Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/",
               },
               {
                  name: "USN-3726-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3726-1/",
               },
               {
                  name: "DSA-4264",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4264",
               },
               {
                  name: "1041403",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041403",
               },
               {
                  name: "RHSA-2019:0265",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:0265",
               },
               {
                  name: "104970",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/104970",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2018-08-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-02-04T10:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/",
            },
            {
               name: "USN-3726-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3726-1/",
            },
            {
               name: "DSA-4264",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2018/dsa-4264",
            },
            {
               name: "1041403",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041403",
            },
            {
               name: "RHSA-2019:0265",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:0265",
            },
            {
               name: "104970",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/104970",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2018-14574",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/",
                  },
                  {
                     name: "USN-3726-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3726-1/",
                  },
                  {
                     name: "DSA-4264",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2018/dsa-4264",
                  },
                  {
                     name: "1041403",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041403",
                  },
                  {
                     name: "RHSA-2019:0265",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:0265",
                  },
                  {
                     name: "104970",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/104970",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-14574",
      datePublished: "2018-08-03T17:00:00",
      dateReserved: "2018-07-24T00:00:00",
      dateUpdated: "2024-08-05T09:29:51.795Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7536
Vulnerability from cvelistv5
Published
2018-03-09 00:00
Modified
2024-08-05 06:31
Severity ?
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:31:04.144Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-3591-1",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3591-1/",
               },
               {
                  name: "RHSA-2019:0051",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:0051",
               },
               {
                  name: "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
               },
               {
                  name: "103361",
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/103361",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
               },
               {
                  name: "RHSA-2019:0082",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:0082",
               },
               {
                  name: "RHSA-2018:2927",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2927",
               },
               {
                  name: "RHSA-2019:0265",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:0265",
               },
               {
                  name: "DSA-4161",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4161",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2018-03-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-07T22:05:43.713862",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-3591-1",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://usn.ubuntu.com/3591-1/",
            },
            {
               name: "RHSA-2019:0051",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:0051",
            },
            {
               name: "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
            },
            {
               name: "103361",
               tags: [
                  "vdb-entry",
               ],
               url: "http://www.securityfocus.com/bid/103361",
            },
            {
               url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
            },
            {
               name: "RHSA-2019:0082",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:0082",
            },
            {
               name: "RHSA-2018:2927",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:2927",
            },
            {
               name: "RHSA-2019:0265",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:0265",
            },
            {
               name: "DSA-4161",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2018/dsa-4161",
            },
            {
               url: "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2",
            },
            {
               url: "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16",
            },
            {
               url: "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-7536",
      datePublished: "2018-03-09T00:00:00",
      dateReserved: "2018-02-26T00:00:00",
      dateUpdated: "2024-08-05T06:31:04.144Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-14235
Vulnerability from cvelistv5
Published
2019-08-02 14:34
Modified
2024-08-05 00:12
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:12:42.608Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
               },
               {
                  name: "openSUSE-SU-2019:1839",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
               },
               {
                  name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Aug/15",
               },
               {
                  name: "DSA-4498",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4498",
               },
               {
                  name: "openSUSE-SU-2019:1872",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
               },
               {
                  name: "FEDORA-2019-647f74ce51",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-01T01:06:12",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
            },
            {
               name: "openSUSE-SU-2019:1839",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
            },
            {
               name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Aug/15",
            },
            {
               name: "DSA-4498",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4498",
            },
            {
               name: "openSUSE-SU-2019:1872",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
            },
            {
               name: "FEDORA-2019-647f74ce51",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-14235",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
                  },
                  {
                     name: "openSUSE-SU-2019:1839",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
                  },
                  {
                     name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Aug/15",
                  },
                  {
                     name: "DSA-4498",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4498",
                  },
                  {
                     name: "openSUSE-SU-2019:1872",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
                  },
                  {
                     name: "FEDORA-2019-647f74ce51",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190828-0002/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-14235",
      datePublished: "2019-08-02T14:34:22",
      dateReserved: "2019-07-22T00:00:00",
      dateUpdated: "2024-08-05T00:12:42.608Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-2317
Vulnerability from cvelistv5
Published
2015-03-25 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:16.267Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-2539-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-2539-1",
               },
               {
                  name: "73319",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/73319",
               },
               {
                  name: "DSA-3204",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3204",
               },
               {
                  name: "FEDORA-2015-5766",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
               },
               {
                  name: "openSUSE-SU-2015:1598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
               },
               {
                  name: "MDVSA-2015:195",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195",
               },
               {
                  name: "openSUSE-SU-2015:0643",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
               },
               {
                  name: "FEDORA-2015-9604",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-03-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \\x08javascript: URL.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-20T16:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-2539-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-2539-1",
            },
            {
               name: "73319",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/73319",
            },
            {
               name: "DSA-3204",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3204",
            },
            {
               name: "FEDORA-2015-5766",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
            },
            {
               name: "openSUSE-SU-2015:1598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
            },
            {
               name: "MDVSA-2015:195",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195",
            },
            {
               name: "openSUSE-SU-2015:0643",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
            },
            {
               name: "FEDORA-2015-9604",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2317",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \\x08javascript: URL.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-2539-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-2539-1",
                  },
                  {
                     name: "73319",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/73319",
                  },
                  {
                     name: "DSA-3204",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3204",
                  },
                  {
                     name: "FEDORA-2015-5766",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
                  },
                  {
                     name: "openSUSE-SU-2015:1598",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
                  },
                  {
                     name: "MDVSA-2015:195",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195",
                  },
                  {
                     name: "openSUSE-SU-2015:0643",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
                  },
                  {
                     name: "FEDORA-2015-9604",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2317",
      datePublished: "2015-03-25T14:00:00",
      dateReserved: "2015-03-17T00:00:00",
      dateUpdated: "2024-08-06T05:10:16.267Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-12794
Vulnerability from cvelistv5
Published
2017-09-07 13:00
Modified
2024-08-05 18:51
Severity ?
Summary
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.
References
https://usn.ubuntu.com/3559-1/vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/100643vdb-entry, x_refsource_BID
http://www.securitytracker.com/id/1039264vdb-entry, x_refsource_SECTRACK
https://www.djangoproject.com/weblog/2017/sep/05/security-releases/x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T18:51:07.127Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-3559-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3559-1/",
               },
               {
                  name: "100643",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/100643",
               },
               {
                  name: "1039264",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1039264",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-09-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with \"DEBUG = True\" (which makes this page accessible) in your production settings.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-15T09:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-3559-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3559-1/",
            },
            {
               name: "100643",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/100643",
            },
            {
               name: "1039264",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1039264",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2017-12794",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with \"DEBUG = True\" (which makes this page accessible) in your production settings.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-3559-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3559-1/",
                  },
                  {
                     name: "100643",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/100643",
                  },
                  {
                     name: "1039264",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1039264",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2017-12794",
      datePublished: "2017-09-07T13:00:00",
      dateReserved: "2017-08-10T00:00:00",
      dateUpdated: "2024-08-05T18:51:07.127Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-44420
Vulnerability from cvelistv5
Published
2021-12-07 22:55
Modified
2024-08-04 04:17
Severity ?
Summary
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:17:25.193Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.2/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2021/12/07/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20211229-0006/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-11T02:06:38",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.2/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.openwall.com/lists/oss-security/2021/12/07/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20211229-0006/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-44420",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.2/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.2/releases/security/",
                  },
                  {
                     name: "https://www.openwall.com/lists/oss-security/2021/12/07/1",
                     refsource: "CONFIRM",
                     url: "https://www.openwall.com/lists/oss-security/2021/12/07/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20211229-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20211229-0006/",
                  },
                  {
                     name: "FEDORA-2022-e7fd530688",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-44420",
      datePublished: "2021-12-07T22:55:40",
      dateReserved: "2021-11-29T00:00:00",
      dateUpdated: "2024-08-04T04:17:25.193Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2012-3444
Vulnerability from cvelistv5
Published
2012-07-31 17:00
Modified
2024-08-06 20:05
Severity ?
Summary
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T20:05:12.482Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
               },
               {
                  name: "MDVSA-2012:143",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
               },
               {
                  name: "USN-1560-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1560-1",
               },
               {
                  name: "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
               },
               {
                  name: "DSA-2529",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2012/dsa-2529",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-07-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2012-09-29T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
            },
            {
               name: "MDVSA-2012:143",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
            },
            {
               name: "USN-1560-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1560-1",
            },
            {
               name: "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
            },
            {
               name: "DSA-2529",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2012/dsa-2529",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2012-3444",
      datePublished: "2012-07-31T17:00:00",
      dateReserved: "2012-06-14T00:00:00",
      dateUpdated: "2024-08-06T20:05:12.482Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-24680
Vulnerability from cvelistv5
Published
2024-02-06 00:00
Modified
2024-08-01 23:28
Severity ?
Summary
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T23:28:11.095Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/5.0/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/",
               },
               {
                  name: "FEDORA-2024-5c7fb64c74",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/",
               },
               {
                  name: "FEDORA-2024-2ec03ca8cb",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/",
               },
               {
                  name: "FEDORA-2024-84fbbbb914",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-20T03:05:55.273636",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/5.0/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/",
            },
            {
               name: "FEDORA-2024-5c7fb64c74",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/",
            },
            {
               name: "FEDORA-2024-2ec03ca8cb",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/",
            },
            {
               name: "FEDORA-2024-84fbbbb914",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-24680",
      datePublished: "2024-02-06T00:00:00",
      dateReserved: "2024-01-26T00:00:00",
      dateUpdated: "2024-08-01T23:28:11.095Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-9402
Vulnerability from cvelistv5
Published
2020-03-05 14:49
Modified
2024-08-04 10:26
Severity ?
Summary
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:26:16.139Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.0/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/",
               },
               {
                  name: "USN-4296-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4296-1/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200327-0004/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
               {
                  name: "DSA-4705",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4705",
               },
               {
                  name: "FEDORA-2020-c2639662af",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
               },
               {
                  name: "FEDORA-2020-2e7d30f7aa",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/",
               },
               {
                  name: "[debian-lts-announce] 20220526 [SECURITY] [DLA 3024-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-26T12:06:05",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.0/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/",
            },
            {
               name: "USN-4296-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4296-1/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200327-0004/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
            {
               name: "DSA-4705",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4705",
            },
            {
               name: "FEDORA-2020-c2639662af",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
            },
            {
               name: "FEDORA-2020-2e7d30f7aa",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/",
            },
            {
               name: "[debian-lts-announce] 20220526 [SECURITY] [DLA 3024-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-9402",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/3.0/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.0/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/",
                  },
                  {
                     name: "USN-4296-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4296-1/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200327-0004/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200327-0004/",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
                  {
                     name: "DSA-4705",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4705",
                  },
                  {
                     name: "FEDORA-2020-c2639662af",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
                  },
                  {
                     name: "FEDORA-2020-2e7d30f7aa",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/",
                  },
                  {
                     name: "[debian-lts-announce] 20220526 [SECURITY] [DLA 3024-1] python-django security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-9402",
      datePublished: "2020-03-05T14:49:57",
      dateReserved: "2020-02-25T00:00:00",
      dateUpdated: "2024-08-04T10:26:16.139Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-6188
Vulnerability from cvelistv5
Published
2018-02-05 03:00
Modified
2024-08-05 05:54
Severity ?
Summary
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
References
https://usn.ubuntu.com/3559-1/vendor-advisory, x_refsource_UBUNTU
http://www.securitytracker.com/id/1040422vdb-entry, x_refsource_SECTRACK
https://www.djangoproject.com/weblog/2018/feb/01/security-releases/x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T05:54:53.251Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-3559-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3559-1/",
               },
               {
                  name: "1040422",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1040422",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2018-02-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-15T09:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-3559-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3559-1/",
            },
            {
               name: "1040422",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1040422",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2018-6188",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-3559-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3559-1/",
                  },
                  {
                     name: "1040422",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1040422",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-6188",
      datePublished: "2018-02-05T03:00:00",
      dateReserved: "2018-01-24T00:00:00",
      dateUpdated: "2024-08-05T05:54:53.251Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-3982
Vulnerability from cvelistv5
Published
2015-06-02 14:00
Modified
2024-08-06 06:04
Severity ?
Summary
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T06:04:02.239Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/may/20/security-release/",
               },
               {
                  name: "74960",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/74960",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-05-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-02T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/may/20/security-release/",
            },
            {
               name: "74960",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/74960",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-3982",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2015/may/20/security-release/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/may/20/security-release/",
                  },
                  {
                     name: "74960",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/74960",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-3982",
      datePublished: "2015-06-02T14:00:00",
      dateReserved: "2015-05-13T00:00:00",
      dateUpdated: "2024-08-06T06:04:02.239Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-0222
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
Summary
ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T04:03:10.434Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FEDORA-2015-0804",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
               },
               {
                  name: "USN-2469-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-2469-1",
               },
               {
                  name: "FEDORA-2015-0790",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
               },
               {
                  name: "62285",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62285",
               },
               {
                  name: "openSUSE-SU-2015:1598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
               },
               {
                  name: "openSUSE-SU-2015:0643",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
               },
               {
                  name: "62309",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62309",
               },
               {
                  name: "MDVSA-2015:109",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://advisories.mageia.org/MGASA-2015-0026.html",
               },
               {
                  name: "FEDORA-2015-0714",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-20T16:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "FEDORA-2015-0804",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
            },
            {
               name: "USN-2469-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-2469-1",
            },
            {
               name: "FEDORA-2015-0790",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
            },
            {
               name: "62285",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62285",
            },
            {
               name: "openSUSE-SU-2015:1598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
            },
            {
               name: "openSUSE-SU-2015:0643",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
            },
            {
               name: "62309",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62309",
            },
            {
               name: "MDVSA-2015:109",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://advisories.mageia.org/MGASA-2015-0026.html",
            },
            {
               name: "FEDORA-2015-0714",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2015-0222",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FEDORA-2015-0804",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
                  },
                  {
                     name: "USN-2469-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-2469-1",
                  },
                  {
                     name: "FEDORA-2015-0790",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
                  },
                  {
                     name: "62285",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62285",
                  },
                  {
                     name: "openSUSE-SU-2015:1598",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                  },
                  {
                     name: "openSUSE-SU-2015:0643",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
                  },
                  {
                     name: "62309",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62309",
                  },
                  {
                     name: "MDVSA-2015:109",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
                  },
                  {
                     name: "http://advisories.mageia.org/MGASA-2015-0026.html",
                     refsource: "CONFIRM",
                     url: "http://advisories.mageia.org/MGASA-2015-0026.html",
                  },
                  {
                     name: "FEDORA-2015-0714",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-0222",
      datePublished: "2015-01-16T16:00:00",
      dateReserved: "2014-11-18T00:00:00",
      dateUpdated: "2024-08-06T04:03:10.434Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-28347
Vulnerability from cvelistv5
Published
2022-04-12 00:00
Modified
2025-02-13 16:32
Severity ?
Summary
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:56:14.933Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
               },
               {
                  name: "DSA-5254",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2022/dsa-5254",
               },
               {
                  name: "FEDORA-2023-8fed428c5e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
               },
               {
                  name: "FEDORA-2023-a53ab7c969",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-28T03:06:22.672Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
            },
            {
               url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
            },
            {
               name: "DSA-5254",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2022/dsa-5254",
            },
            {
               name: "FEDORA-2023-8fed428c5e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
            },
            {
               name: "FEDORA-2023-a53ab7c969",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-28347",
      datePublished: "2022-04-12T00:00:00.000Z",
      dateReserved: "2022-04-02T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:32:34.174Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-43665
Vulnerability from cvelistv5
Published
2023-11-03 00:00
Modified
2024-08-02 19:44
Severity ?
Summary
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T19:44:43.929Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.2/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/",
               },
               {
                  name: "FEDORA-2023-a67af7d8f4",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231221-0001/",
               },
               {
                  name: "FEDORA-2024-84fbbbb914",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
               },
               {
                  name: "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-01T17:09:51.000328",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.2/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/",
            },
            {
               name: "FEDORA-2023-a67af7d8f4",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231221-0001/",
            },
            {
               name: "FEDORA-2024-84fbbbb914",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
            },
            {
               name: "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-43665",
      datePublished: "2023-11-03T00:00:00",
      dateReserved: "2023-09-20T00:00:00",
      dateUpdated: "2024-08-02T19:44:43.929Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-33571
Vulnerability from cvelistv5
Published
2021-06-08 00:00
Modified
2024-08-03 23:50
Severity ?
Summary
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T23:50:43.143Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.2/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-07T22:09:18.547259",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/3.2/releases/security/",
            },
            {
               url: "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo",
            },
            {
               url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
            {
               url: "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc",
            },
            {
               url: "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e",
            },
            {
               url: "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-33571",
      datePublished: "2021-06-08T00:00:00",
      dateReserved: "2021-05-25T00:00:00",
      dateUpdated: "2024-08-03T23:50:43.143Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-46695
Vulnerability from cvelistv5
Published
2023-11-02 00:00
Modified
2024-08-02 20:53
Severity ?
Summary
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T20:53:20.867Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.2/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231214-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-14T10:06:39.801548",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.2/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231214-0001/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-46695",
      datePublished: "2023-11-02T00:00:00",
      dateReserved: "2023-10-25T00:00:00",
      dateUpdated: "2024-08-02T20:53:20.867Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-7471
Vulnerability from cvelistv5
Published
2020-02-03 11:59
Modified
2024-08-04 09:33
Severity ?
Summary
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T09:33:19.635Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.0/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2020/02/03/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/",
               },
               {
                  name: "[oss-security] 20200203 Django 3.0.3, 2.2.10 and 1.11.28: CVE-2020-7471: Potential SQL injection via ``StringAgg(delimiter)``",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2020/02/03/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136",
               },
               {
                  name: "USN-4264-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4264-1/",
               },
               {
                  name: "20200219 [SECURITY] [DSA 4629-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2020/Feb/30",
               },
               {
                  name: "DSA-4629",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4629",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200221-0006/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
               {
                  name: "FEDORA-2020-c2639662af",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-19T02:06:18",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://docs.djangoproject.com/en/3.0/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.openwall.com/lists/oss-security/2020/02/03/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/",
            },
            {
               name: "[oss-security] 20200203 Django 3.0.3, 2.2.10 and 1.11.28: CVE-2020-7471: Potential SQL injection via ``StringAgg(delimiter)``",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2020/02/03/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136",
            },
            {
               name: "USN-4264-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4264-1/",
            },
            {
               name: "20200219 [SECURITY] [DSA 4629-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2020/Feb/30",
            },
            {
               name: "DSA-4629",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4629",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200221-0006/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
            {
               name: "FEDORA-2020-c2639662af",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-7471",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI",
                     refsource: "CONFIRM",
                     url: "https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.0/releases/security/",
                     refsource: "CONFIRM",
                     url: "https://docs.djangoproject.com/en/3.0/releases/security/",
                  },
                  {
                     name: "https://www.openwall.com/lists/oss-security/2020/02/03/1",
                     refsource: "CONFIRM",
                     url: "https://www.openwall.com/lists/oss-security/2020/02/03/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/",
                  },
                  {
                     name: "[oss-security] 20200203 Django 3.0.3, 2.2.10 and 1.11.28: CVE-2020-7471: Potential SQL injection via ``StringAgg(delimiter)``",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2020/02/03/1",
                  },
                  {
                     name: "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136",
                  },
                  {
                     name: "USN-4264-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4264-1/",
                  },
                  {
                     name: "20200219 [SECURITY] [DSA 4629-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2020/Feb/30",
                  },
                  {
                     name: "DSA-4629",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4629",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200221-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200221-0006/",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
                  {
                     name: "FEDORA-2020-c2639662af",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-7471",
      datePublished: "2020-02-03T11:59:20",
      dateReserved: "2020-01-21T00:00:00",
      dateUpdated: "2024-08-04T09:33:19.635Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-5144
Vulnerability from cvelistv5
Published
2015-07-14 17:00
Modified
2024-08-06 06:32
Severity ?
Summary
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T06:32:32.919Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FEDORA-2015-1dd5bc998f",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
               },
               {
                  name: "GLSA-201510-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201510-06",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
               },
               {
                  name: "openSUSE-SU-2015:1802",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
               },
               {
                  name: "openSUSE-SU-2015:1813",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
               },
               {
                  name: "DSA-3305",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3305",
               },
               {
                  name: "75665",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75665",
               },
               {
                  name: "USN-2671-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2671-1",
               },
               {
                  name: "1032820",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032820",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-07-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-21T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FEDORA-2015-1dd5bc998f",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
            },
            {
               name: "GLSA-201510-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201510-06",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
            },
            {
               name: "openSUSE-SU-2015:1802",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
            },
            {
               name: "openSUSE-SU-2015:1813",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
            },
            {
               name: "DSA-3305",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3305",
            },
            {
               name: "75665",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75665",
            },
            {
               name: "USN-2671-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2671-1",
            },
            {
               name: "1032820",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032820",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-5144",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FEDORA-2015-1dd5bc998f",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
                  },
                  {
                     name: "GLSA-201510-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201510-06",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
                  },
                  {
                     name: "openSUSE-SU-2015:1802",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
                  },
                  {
                     name: "openSUSE-SU-2015:1813",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
                  },
                  {
                     name: "DSA-3305",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3305",
                  },
                  {
                     name: "75665",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75665",
                  },
                  {
                     name: "USN-2671-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2671-1",
                  },
                  {
                     name: "1032820",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032820",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-5144",
      datePublished: "2015-07-14T17:00:00",
      dateReserved: "2015-06-29T00:00:00",
      dateUpdated: "2024-08-06T06:32:32.919Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-4139
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
Summary
Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T00:01:50.429Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "openSUSE-SU-2012:0653",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "https://hermes.opensuse.org/messages/14700881",
               },
               {
                  name: "DSA-2332",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2332",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
               },
               {
                  name: "46614",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/46614",
               },
               {
                  name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/11/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
               },
               {
                  name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/13/2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/09/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-09-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-17T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "openSUSE-SU-2012:0653",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "https://hermes.opensuse.org/messages/14700881",
            },
            {
               name: "DSA-2332",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2332",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
            },
            {
               name: "46614",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/46614",
            },
            {
               name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/11/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
            },
            {
               name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/13/2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/09/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-4139",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "openSUSE-SU-2012:0653",
                     refsource: "SUSE",
                     url: "https://hermes.opensuse.org/messages/14700881",
                  },
                  {
                     name: "DSA-2332",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2011/dsa-2332",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                  },
                  {
                     name: "46614",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/46614",
                  },
                  {
                     name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/11/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                  },
                  {
                     name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/13/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/09/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/09/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-4139",
      datePublished: "2011-10-19T10:00:00",
      dateReserved: "2011-10-19T00:00:00",
      dateUpdated: "2024-08-07T00:01:50.429Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-0481
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
Summary
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
References
https://www.djangoproject.com/weblog/2014/aug/20/security/x_refsource_CONFIRM
http://secunia.com/advisories/61276third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2014/dsa-3010vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/59782third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:20:18.410Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
               },
               {
                  name: "61276",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61276",
               },
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "DSA-3010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-3010",
               },
               {
                  name: "59782",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59782",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
            },
            {
               name: "61276",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61276",
            },
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "DSA-3010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-3010",
            },
            {
               name: "59782",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59782",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-0481",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                  },
                  {
                     name: "61276",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61276",
                  },
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "DSA-3010",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-3010",
                  },
                  {
                     name: "59782",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59782",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-0481",
      datePublished: "2014-08-26T14:00:00",
      dateReserved: "2013-12-19T00:00:00",
      dateUpdated: "2024-08-06T09:20:18.410Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-36359
Vulnerability from cvelistv5
Published
2022-08-03 00:00
Modified
2025-02-13 16:32
Severity ?
Summary
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T10:00:04.235Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  name: "[oss-security] 20220803 Django: CVE-2022-36359: Potential reflected file download vulnerability in FileResponse.",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2022/08/03/1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/g/django-announce/c/8cz--gvaJr4",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220915-0008/",
               },
               {
                  name: "DSA-5254",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2022/dsa-5254",
               },
               {
                  name: "FEDORA-2023-8fed428c5e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
               },
               {
                  name: "FEDORA-2023-a53ab7c969",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-28T03:06:19.367Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               name: "[oss-security] 20220803 Django: CVE-2022-36359: Potential reflected file download vulnerability in FileResponse.",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2022/08/03/1",
            },
            {
               url: "https://groups.google.com/g/django-announce/c/8cz--gvaJr4",
            },
            {
               url: "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20220915-0008/",
            },
            {
               name: "DSA-5254",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2022/dsa-5254",
            },
            {
               name: "FEDORA-2023-8fed428c5e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
            },
            {
               name: "FEDORA-2023-a53ab7c969",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-36359",
      datePublished: "2022-08-03T00:00:00.000Z",
      dateReserved: "2022-07-21T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:32:48.215Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-45115
Vulnerability from cvelistv5
Published
2022-01-04 23:16
Modified
2024-08-04 04:39
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:39:20.303Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-11T02:06:36",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-45115",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/4.0/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/4.0/releases/security/",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20220121-0005/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
                  },
                  {
                     name: "FEDORA-2022-e7fd530688",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-45115",
      datePublished: "2022-01-04T23:16:00",
      dateReserved: "2021-12-16T00:00:00",
      dateUpdated: "2024-08-04T04:39:20.303Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-0305
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 14:18
Severity ?
Summary
The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.
References
https://www.djangoproject.com/weblog/2013/feb/19/security/x_refsource_CONFIRM
http://ubuntu.com/usn/usn-1757-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2013/dsa-2634vendor-advisory, x_refsource_DEBIAN
http://rhn.redhat.com/errata/RHSA-2013-0670.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T14:18:09.639Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
               },
               {
                  name: "USN-1757-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-1757-1",
               },
               {
                  name: "DSA-2634",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2013/dsa-2634",
               },
               {
                  name: "RHSA-2013:0670",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-02-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-05-15T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
            },
            {
               name: "USN-1757-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-1757-1",
            },
            {
               name: "DSA-2634",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2013/dsa-2634",
            },
            {
               name: "RHSA-2013:0670",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2013-0305",
      datePublished: "2013-05-02T14:00:00",
      dateReserved: "2012-12-06T00:00:00",
      dateUpdated: "2024-08-06T14:18:09.639Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-1443
Vulnerability from cvelistv5
Published
2013-09-23 20:00
Modified
2024-08-06 15:04
Severity ?
Summary
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T15:04:48.781Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "DSA-2758",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2013/dsa-2758",
               },
               {
                  name: "[django-developers] 20130914 Set a reasonable upper bound on password length",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html",
               },
               {
                  name: "openSUSE-SU-2013:1541",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2013/sep/15/security/",
               },
               {
                  name: "openSUSE-SU-2013:1685",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-09-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2014-01-23T14:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               name: "DSA-2758",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2013/dsa-2758",
            },
            {
               name: "[django-developers] 20130914 Set a reasonable upper bound on password length",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html",
            },
            {
               name: "openSUSE-SU-2013:1541",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2013/sep/15/security/",
            },
            {
               name: "openSUSE-SU-2013:1685",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2013-1443",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "DSA-2758",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2013/dsa-2758",
                  },
                  {
                     name: "[django-developers] 20130914 Set a reasonable upper bound on password length",
                     refsource: "MLIST",
                     url: "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html",
                  },
                  {
                     name: "openSUSE-SU-2013:1541",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2013/sep/15/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2013/sep/15/security/",
                  },
                  {
                     name: "openSUSE-SU-2013:1685",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2013-1443",
      datePublished: "2013-09-23T20:00:00",
      dateReserved: "2013-01-26T00:00:00",
      dateUpdated: "2024-08-06T15:04:48.781Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-0219
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
Summary
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T04:03:10.188Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "62718",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62718",
               },
               {
                  name: "FEDORA-2015-0804",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
               },
               {
                  name: "MDVSA-2015:036",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
               },
               {
                  name: "FEDORA-2015-0790",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
               },
               {
                  name: "62285",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62285",
               },
               {
                  name: "openSUSE-SU-2015:1598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
               },
               {
                  name: "USN-2469-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2469-1",
               },
               {
                  name: "openSUSE-SU-2015:0643",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
               },
               {
                  name: "62309",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62309",
               },
               {
                  name: "MDVSA-2015:109",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://advisories.mageia.org/MGASA-2015-0026.html",
               },
               {
                  name: "FEDORA-2015-0714",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-20T16:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "62718",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62718",
            },
            {
               name: "FEDORA-2015-0804",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
            },
            {
               name: "MDVSA-2015:036",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
            },
            {
               name: "FEDORA-2015-0790",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
            },
            {
               name: "62285",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62285",
            },
            {
               name: "openSUSE-SU-2015:1598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
            },
            {
               name: "USN-2469-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2469-1",
            },
            {
               name: "openSUSE-SU-2015:0643",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
            },
            {
               name: "62309",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62309",
            },
            {
               name: "MDVSA-2015:109",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://advisories.mageia.org/MGASA-2015-0026.html",
            },
            {
               name: "FEDORA-2015-0714",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2015-0219",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "62718",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62718",
                  },
                  {
                     name: "FEDORA-2015-0804",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
                  },
                  {
                     name: "MDVSA-2015:036",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
                  },
                  {
                     name: "FEDORA-2015-0790",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
                  },
                  {
                     name: "62285",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62285",
                  },
                  {
                     name: "openSUSE-SU-2015:1598",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                  },
                  {
                     name: "USN-2469-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2469-1",
                  },
                  {
                     name: "openSUSE-SU-2015:0643",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
                  },
                  {
                     name: "62309",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62309",
                  },
                  {
                     name: "MDVSA-2015:109",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
                  },
                  {
                     name: "http://advisories.mageia.org/MGASA-2015-0026.html",
                     refsource: "CONFIRM",
                     url: "http://advisories.mageia.org/MGASA-2015-0026.html",
                  },
                  {
                     name: "FEDORA-2015-0714",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-0219",
      datePublished: "2015-01-16T16:00:00",
      dateReserved: "2014-11-18T00:00:00",
      dateUpdated: "2024-08-06T04:03:10.188Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-6186
Vulnerability from cvelistv5
Published
2016-08-05 15:00
Modified
2024-08-06 01:22
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
References
http://www.securitytracker.com/id/1036338vdb-entry, x_refsource_SECTRACK
http://seclists.org/fulldisclosure/2016/Jul/53mailing-list, x_refsource_FULLDISC
http://rhn.redhat.com/errata/RHSA-2016-1594.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2016/dsa-3622vendor-advisory, x_refsource_DEBIAN
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/vendor-advisory, x_refsource_FEDORA
http://www.vulnerability-lab.com/get_content.php?id=1869x_refsource_MISC
http://www.securityfocus.com/archive/1/538947/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.htmlx_refsource_MISC
http://www.ubuntu.com/usn/USN-3039-1vendor-advisory, x_refsource_UBUNTU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/vendor-advisory, x_refsource_FEDORA
https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479dx_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2016-1596.htmlvendor-advisory, x_refsource_REDHAT
https://www.djangoproject.com/weblog/2016/jul/18/security-releases/x_refsource_CONFIRM
https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158x_refsource_CONFIRM
http://www.securityfocus.com/bid/92058vdb-entry, x_refsource_BID
http://rhn.redhat.com/errata/RHSA-2016-1595.htmlvendor-advisory, x_refsource_REDHAT
https://www.exploit-db.com/exploits/40129/exploit, x_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:22:20.927Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1036338",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1036338",
               },
               {
                  name: "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2016/Jul/53",
               },
               {
                  name: "RHSA-2016:1594",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-1594.html",
               },
               {
                  name: "DSA-3622",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2016/dsa-3622",
               },
               {
                  name: "FEDORA-2016-97ca9d52a4",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.vulnerability-lab.com/get_content.php?id=1869",
               },
               {
                  name: "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/538947/100/0/threaded",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html",
               },
               {
                  name: "USN-3039-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-3039-1",
               },
               {
                  name: "FEDORA-2016-b7e31a0b9a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d",
               },
               {
                  name: "RHSA-2016:1596",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-1596.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158",
               },
               {
                  name: "92058",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/92058",
               },
               {
                  name: "RHSA-2016:1595",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-1595.html",
               },
               {
                  name: "40129",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/40129/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-07-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-09T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1036338",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1036338",
            },
            {
               name: "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2016/Jul/53",
            },
            {
               name: "RHSA-2016:1594",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-1594.html",
            },
            {
               name: "DSA-3622",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2016/dsa-3622",
            },
            {
               name: "FEDORA-2016-97ca9d52a4",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.vulnerability-lab.com/get_content.php?id=1869",
            },
            {
               name: "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/538947/100/0/threaded",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html",
            },
            {
               name: "USN-3039-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-3039-1",
            },
            {
               name: "FEDORA-2016-b7e31a0b9a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d",
            },
            {
               name: "RHSA-2016:1596",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-1596.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158",
            },
            {
               name: "92058",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/92058",
            },
            {
               name: "RHSA-2016:1595",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-1595.html",
            },
            {
               name: "40129",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/40129/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-6186",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1036338",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1036338",
                  },
                  {
                     name: "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2016/Jul/53",
                  },
                  {
                     name: "RHSA-2016:1594",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-1594.html",
                  },
                  {
                     name: "DSA-3622",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2016/dsa-3622",
                  },
                  {
                     name: "FEDORA-2016-97ca9d52a4",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/",
                  },
                  {
                     name: "http://www.vulnerability-lab.com/get_content.php?id=1869",
                     refsource: "MISC",
                     url: "http://www.vulnerability-lab.com/get_content.php?id=1869",
                  },
                  {
                     name: "20160719 Django CMS v3.3.0 - (Editor Snippet) Persistent Web Vulnerability (CVE-2016-6186)",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/538947/100/0/threaded",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html",
                  },
                  {
                     name: "USN-3039-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-3039-1",
                  },
                  {
                     name: "FEDORA-2016-b7e31a0b9a",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/",
                  },
                  {
                     name: "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d",
                  },
                  {
                     name: "RHSA-2016:1596",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-1596.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/",
                  },
                  {
                     name: "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158",
                  },
                  {
                     name: "92058",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/92058",
                  },
                  {
                     name: "RHSA-2016:1595",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-1595.html",
                  },
                  {
                     name: "40129",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/40129/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-6186",
      datePublished: "2016-08-05T15:00:00",
      dateReserved: "2016-07-08T00:00:00",
      dateUpdated: "2024-08-06T01:22:20.927Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-45452
Vulnerability from cvelistv5
Published
2022-01-04 23:09
Modified
2024-08-04 04:39
Severity ?
Summary
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:39:21.126Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-11T02:06:30",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-45452",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/4.0/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/4.0/releases/security/",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20220121-0005/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
                  },
                  {
                     name: "FEDORA-2022-e7fd530688",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-45452",
      datePublished: "2022-01-04T23:09:40",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-08-04T04:39:21.126Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-4137
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T00:01:50.805Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/15/5",
               },
               {
                  name: "openSUSE-SU-2012:0653",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "https://hermes.opensuse.org/messages/14700881",
               },
               {
                  name: "DSA-2332",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2332",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
               },
               {
                  name: "46614",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/46614",
               },
               {
                  name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/11/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
               },
               {
                  name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/13/2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/09/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-09-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-17T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "[oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/15/5",
            },
            {
               name: "openSUSE-SU-2012:0653",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "https://hermes.opensuse.org/messages/14700881",
            },
            {
               name: "DSA-2332",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2332",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
            },
            {
               name: "46614",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/46614",
            },
            {
               name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/11/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
            },
            {
               name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/13/2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/09/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-4137",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/15/5",
                  },
                  {
                     name: "openSUSE-SU-2012:0653",
                     refsource: "SUSE",
                     url: "https://hermes.opensuse.org/messages/14700881",
                  },
                  {
                     name: "DSA-2332",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2011/dsa-2332",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                  },
                  {
                     name: "46614",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/46614",
                  },
                  {
                     name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/11/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                  },
                  {
                     name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/13/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/09/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/09/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-4137",
      datePublished: "2011-10-19T10:00:00",
      dateReserved: "2011-10-19T00:00:00",
      dateUpdated: "2024-08-07T00:01:50.805Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-9013
Vulnerability from cvelistv5
Published
2016-12-09 20:00
Modified
2024-08-06 02:35
Severity ?
Summary
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:35:02.828Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
               },
               {
                  name: "FEDORA-2016-d4571bf555",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
               },
               {
                  name: "DSA-3835",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2017/dsa-3835",
               },
               {
                  name: "USN-3115-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-3115-1",
               },
               {
                  name: "94069",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94069",
               },
               {
                  name: "1037159",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1037159",
               },
               {
                  name: "FEDORA-2016-3eb5a55123",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-11-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-03T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
            },
            {
               name: "FEDORA-2016-d4571bf555",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
            },
            {
               name: "DSA-3835",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2017/dsa-3835",
            },
            {
               name: "USN-3115-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-3115-1",
            },
            {
               name: "94069",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94069",
            },
            {
               name: "1037159",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1037159",
            },
            {
               name: "FEDORA-2016-3eb5a55123",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-9013",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
                  },
                  {
                     name: "FEDORA-2016-d4571bf555",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
                  },
                  {
                     name: "DSA-3835",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2017/dsa-3835",
                  },
                  {
                     name: "USN-3115-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-3115-1",
                  },
                  {
                     name: "94069",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94069",
                  },
                  {
                     name: "1037159",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1037159",
                  },
                  {
                     name: "FEDORA-2016-3eb5a55123",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-9013",
      datePublished: "2016-12-09T20:00:00",
      dateReserved: "2016-10-25T00:00:00",
      dateUpdated: "2024-08-06T02:35:02.828Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-41323
Vulnerability from cvelistv5
Published
2022-10-16 00:00
Modified
2025-02-13 16:33
Severity ?
Summary
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T12:42:45.749Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20221124-0001/",
               },
               {
                  name: "FEDORA-2023-3d775d93be",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
               },
               {
                  name: "FEDORA-2023-bde7913e5a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
               },
               {
                  name: "FEDORA-2023-a74513bda8",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
               },
               {
                  name: "FEDORA-2023-8fed428c5e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
               },
               {
                  name: "FEDORA-2023-a53ab7c969",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-28T03:06:15.950Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/",
            },
            {
               url: "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20221124-0001/",
            },
            {
               name: "FEDORA-2023-3d775d93be",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
            },
            {
               name: "FEDORA-2023-bde7913e5a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
            },
            {
               name: "FEDORA-2023-a74513bda8",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
            },
            {
               name: "FEDORA-2023-8fed428c5e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
            },
            {
               name: "FEDORA-2023-a53ab7c969",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-41323",
      datePublished: "2022-10-16T00:00:00.000Z",
      dateReserved: "2022-09-23T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:33:04.202Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-7234
Vulnerability from cvelistv5
Published
2017-04-04 17:00
Modified
2024-08-05 15:56
Severity ?
Summary
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
References
http://www.securitytracker.com/id/1038177vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/97401vdb-entry, x_refsource_BID
http://www.debian.org/security/2017/dsa-3835vendor-advisory, x_refsource_DEBIAN
https://www.djangoproject.com/weblog/2017/apr/04/security-releases/x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:56:36.057Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1038177",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1038177",
               },
               {
                  name: "97401",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/97401",
               },
               {
                  name: "DSA-3835",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2017/dsa-3835",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-04-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-03T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1038177",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1038177",
            },
            {
               name: "97401",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/97401",
            },
            {
               name: "DSA-3835",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2017/dsa-3835",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2017-7234",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1038177",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1038177",
                  },
                  {
                     name: "97401",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/97401",
                  },
                  {
                     name: "DSA-3835",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2017/dsa-3835",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2017-7234",
      datePublished: "2017-04-04T17:00:00",
      dateReserved: "2017-03-22T00:00:00",
      dateUpdated: "2024-08-05T15:56:36.057Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-14234
Vulnerability from cvelistv5
Published
2019-08-09 12:16
Modified
2024-08-05 00:12
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:12:42.480Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
               },
               {
                  name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Aug/15",
               },
               {
                  name: "DSA-4498",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4498",
               },
               {
                  name: "openSUSE-SU-2019:1872",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
               },
               {
                  name: "FEDORA-2019-647f74ce51",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of \"OR 1=1\" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-01T01:06:11",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
            },
            {
               name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Aug/15",
            },
            {
               name: "DSA-4498",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4498",
            },
            {
               name: "openSUSE-SU-2019:1872",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
            },
            {
               name: "FEDORA-2019-647f74ce51",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-14234",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of \"OR 1=1\" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
                  },
                  {
                     name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Aug/15",
                  },
                  {
                     name: "DSA-4498",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4498",
                  },
                  {
                     name: "openSUSE-SU-2019:1872",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
                  },
                  {
                     name: "FEDORA-2019-647f74ce51",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190828-0002/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-14234",
      datePublished: "2019-08-09T12:16:44",
      dateReserved: "2019-07-22T00:00:00",
      dateUpdated: "2024-08-05T00:12:42.480Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-0483
Vulnerability from cvelistv5
Published
2014-08-26 14:00
Modified
2024-08-06 09:20
Severity ?
Summary
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.
References
https://www.djangoproject.com/weblog/2014/aug/20/security/x_refsource_CONFIRM
http://secunia.com/advisories/61276third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2014/dsa-3010vendor-advisory, x_refsource_DEBIAN
https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6x_refsource_CONFIRM
http://secunia.com/advisories/59782third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:20:18.489Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
               },
               {
                  name: "61276",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61276",
               },
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "DSA-3010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-3010",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6",
               },
               {
                  name: "59782",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59782",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
            },
            {
               name: "61276",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61276",
            },
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "DSA-3010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-3010",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6",
            },
            {
               name: "59782",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59782",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-0483",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
                  },
                  {
                     name: "61276",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61276",
                  },
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "DSA-3010",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-3010",
                  },
                  {
                     name: "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6",
                  },
                  {
                     name: "59782",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59782",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-0483",
      datePublished: "2014-08-26T14:00:00",
      dateReserved: "2013-12-19T00:00:00",
      dateUpdated: "2024-08-06T09:20:18.489Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2012-4520
Vulnerability from cvelistv5
Published
2012-11-18 23:00
Modified
2024-08-06 20:42
Severity ?
Summary
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T20:42:53.672Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20121029 Re: CVE Request: Django",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2012/10/30/4",
               },
               {
                  name: "1027708",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1027708",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071",
               },
               {
                  name: "86493",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/86493",
               },
               {
                  name: "51314",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/51314",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145",
               },
               {
                  name: "FEDORA-2012-16440",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html",
               },
               {
                  name: "USN-1757-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-1757-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3",
               },
               {
                  name: "DSA-2634",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2013/dsa-2634",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2012/oct/17/security/",
               },
               {
                  name: "FEDORA-2012-16417",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e",
               },
               {
                  name: "51033",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/51033",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=865164",
               },
               {
                  name: "FEDORA-2012-16406",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html",
               },
               {
                  name: "USN-1632-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-1632-1",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-10-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-05-04T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20121029 Re: CVE Request: Django",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2012/10/30/4",
            },
            {
               name: "1027708",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1027708",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071",
            },
            {
               name: "86493",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/86493",
            },
            {
               name: "51314",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/51314",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145",
            },
            {
               name: "FEDORA-2012-16440",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html",
            },
            {
               name: "USN-1757-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-1757-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3",
            },
            {
               name: "DSA-2634",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2013/dsa-2634",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2012/oct/17/security/",
            },
            {
               name: "FEDORA-2012-16417",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e",
            },
            {
               name: "51033",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/51033",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=865164",
            },
            {
               name: "FEDORA-2012-16406",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html",
            },
            {
               name: "USN-1632-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-1632-1",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2012-4520",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[oss-security] 20121029 Re: CVE Request: Django",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2012/10/30/4",
                  },
                  {
                     name: "1027708",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1027708",
                  },
                  {
                     name: "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071",
                  },
                  {
                     name: "86493",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/86493",
                  },
                  {
                     name: "51314",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/51314",
                  },
                  {
                     name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145",
                     refsource: "MISC",
                     url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145",
                  },
                  {
                     name: "FEDORA-2012-16440",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html",
                  },
                  {
                     name: "USN-1757-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-1757-1",
                  },
                  {
                     name: "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3",
                  },
                  {
                     name: "DSA-2634",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2013/dsa-2634",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2012/oct/17/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2012/oct/17/security/",
                  },
                  {
                     name: "FEDORA-2012-16417",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html",
                  },
                  {
                     name: "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e",
                  },
                  {
                     name: "51033",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/51033",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=865164",
                     refsource: "MISC",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=865164",
                  },
                  {
                     name: "FEDORA-2012-16406",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html",
                  },
                  {
                     name: "USN-1632-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-1632-1",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2012-4520",
      datePublished: "2012-11-18T23:00:00",
      dateReserved: "2012-08-21T00:00:00",
      dateUpdated: "2024-08-06T20:42:53.672Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-3082
Vulnerability from cvelistv5
Published
2010-09-14 18:00
Modified
2024-08-07 02:55
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T02:55:46.621Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-1004-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1004-1",
               },
               {
                  name: "django-token-csrf(61729)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729",
               },
               {
                  name: "43116",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/43116",
               },
               {
                  name: "[oss-security] 20100909 CVE Assignment: django",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=oss-security&m=128403961700444&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=632239",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.djangoproject.com/weblog/2010/sep/08/security-release/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-09-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-16T14:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "USN-1004-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1004-1",
            },
            {
               name: "django-token-csrf(61729)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729",
            },
            {
               name: "43116",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/43116",
            },
            {
               name: "[oss-security] 20100909 CVE Assignment: django",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://marc.info/?l=oss-security&m=128403961700444&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=632239",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.djangoproject.com/weblog/2010/sep/08/security-release/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-3082",
      datePublished: "2010-09-14T18:00:00",
      dateReserved: "2010-08-20T00:00:00",
      dateUpdated: "2024-08-07T02:55:46.621Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-8213
Vulnerability from cvelistv5
Published
2015-12-07 20:00
Modified
2024-08-06 08:13
Severity ?
Summary
The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:13:31.831Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4",
               },
               {
                  name: "openSUSE-SU-2015:2199",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html",
               },
               {
                  name: "USN-2816-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2816-1",
               },
               {
                  name: "RHSA-2016:0129",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0129.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/",
               },
               {
                  name: "FEDORA-2015-323274d412",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html",
               },
               {
                  name: "1034237",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1034237",
               },
               {
                  name: "RHSA-2016:0158",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0158.html",
               },
               {
                  name: "RHSA-2016:0157",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0157.html",
               },
               {
                  name: "DSA-3404",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3404",
               },
               {
                  name: "RHSA-2016:0156",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0156.html",
               },
               {
                  name: "77750",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/77750",
               },
               {
                  name: "FEDORA-2015-a8c8f60fbd",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html",
               },
               {
                  name: "openSUSE-SU-2015:2202",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-11-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-05T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4",
            },
            {
               name: "openSUSE-SU-2015:2199",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html",
            },
            {
               name: "USN-2816-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2816-1",
            },
            {
               name: "RHSA-2016:0129",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0129.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/",
            },
            {
               name: "FEDORA-2015-323274d412",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html",
            },
            {
               name: "1034237",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1034237",
            },
            {
               name: "RHSA-2016:0158",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0158.html",
            },
            {
               name: "RHSA-2016:0157",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0157.html",
            },
            {
               name: "DSA-3404",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3404",
            },
            {
               name: "RHSA-2016:0156",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0156.html",
            },
            {
               name: "77750",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/77750",
            },
            {
               name: "FEDORA-2015-a8c8f60fbd",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html",
            },
            {
               name: "openSUSE-SU-2015:2202",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-8213",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4",
                  },
                  {
                     name: "openSUSE-SU-2015:2199",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html",
                  },
                  {
                     name: "USN-2816-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2816-1",
                  },
                  {
                     name: "RHSA-2016:0129",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0129.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/",
                  },
                  {
                     name: "FEDORA-2015-323274d412",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html",
                  },
                  {
                     name: "1034237",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1034237",
                  },
                  {
                     name: "RHSA-2016:0158",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0158.html",
                  },
                  {
                     name: "RHSA-2016:0157",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0157.html",
                  },
                  {
                     name: "DSA-3404",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3404",
                  },
                  {
                     name: "RHSA-2016:0156",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0156.html",
                  },
                  {
                     name: "77750",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/77750",
                  },
                  {
                     name: "FEDORA-2015-a8c8f60fbd",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html",
                  },
                  {
                     name: "openSUSE-SU-2015:2202",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-8213",
      datePublished: "2015-12-07T20:00:00",
      dateReserved: "2015-11-14T00:00:00",
      dateUpdated: "2024-08-06T08:13:31.831Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-41990
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-09-18 14:57
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        lessThan: "4.2.15",
                        status: "affected",
                        version: "4.2",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.0.8",
                        status: "affected",
                        version: "5.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        lessThan: "pkg:pypi/django@4.2.15",
                        status: "affected",
                        version: "pkg:pypi/django@4.2",
                        versionType: "custom",
                     },
                     {
                        lessThan: "pkg:pypi/django@5.0.8",
                        status: "affected",
                        version: "pkg:pypi/django@5.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-41990",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-07T15:20:51.732074Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-130",
                        description: "CWE-130 Improper Handling of Length Parameter Inconsistency",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-18T14:57:21.043Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-08-07T14:11:45.667382",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-41990",
      datePublished: "2024-08-07T00:00:00",
      dateReserved: "2024-07-25T00:00:00",
      dateUpdated: "2024-09-18T14:57:21.043Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-56374
Vulnerability from cvelistv5
Published
2025-01-14 00:00
Modified
2025-02-12 20:31
Summary
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
Impacted products
Vendor Product Version
djangoproject Django Version: 4.2   < 4.2.18
Version: 5.0   < 5.0.11
Version: 5.1   < 5.1.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2025-01-23T18:03:28.376Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  url: "http://www.openwall.com/lists/oss-security/2025/01/14/2",
               },
               {
                  url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00024.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-56374",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-15T19:40:35.398718Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-12T20:31:20.698Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Django",
               vendor: "djangoproject",
               versions: [
                  {
                     lessThan: "4.2.18",
                     status: "affected",
                     version: "4.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "5.0.11",
                     status: "affected",
                     version: "5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "5.1.5",
                     status: "affected",
                     version: "5.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "4.2.18",
                           versionStartIncluding: "4.2",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.0.11",
                           versionStartIncluding: "5.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "5.1.5",
                           versionStartIncluding: "5.1",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-770",
                     description: "CWE-770 Allocation of Resources Without Limits or Throttling",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-14T19:07:03.855Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/g/django-announce",
            },
            {
               url: "https://www.djangoproject.com/weblog/2025/jan/14/security-releases/",
            },
         ],
         x_generator: {
            engine: "enrichogram 0.0.1",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-56374",
      datePublished: "2025-01-14T00:00:00.000Z",
      dateReserved: "2024-12-22T00:00:00.000Z",
      dateUpdated: "2025-02-12T20:31:20.698Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-31047
Vulnerability from cvelistv5
Published
2023-05-07 00:00
Modified
2025-01-29 15:51
Severity ?
Summary
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T14:45:25.559Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.2/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2023/may/03/security-releases/",
               },
               {
                  name: "FEDORA-2023-0d20d09f2d",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/",
               },
               {
                  name: "FEDORA-2023-8f9d949dbc",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20230609-0008/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-31047",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-29T15:49:48.792800Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-862",
                        description: "CWE-862 Missing Authorization",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-29T15:51:24.644Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's \"Uploading multiple files\" documentation suggested otherwise.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-09T00:00:00.000Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.2/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2023/may/03/security-releases/",
            },
            {
               name: "FEDORA-2023-0d20d09f2d",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/",
            },
            {
               name: "FEDORA-2023-8f9d949dbc",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20230609-0008/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-31047",
      datePublished: "2023-05-07T00:00:00.000Z",
      dateReserved: "2023-04-24T00:00:00.000Z",
      dateUpdated: "2025-01-29T15:51:24.644Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22818
Vulnerability from cvelistv5
Published
2022-02-03 00:00
Modified
2024-08-03 03:21
Severity ?
Summary
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:21:49.173Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
               },
               {
                  name: "DSA-5254",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2022/dsa-5254",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-15T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
            },
            {
               name: "DSA-5254",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2022/dsa-5254",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-22818",
      datePublished: "2022-02-03T00:00:00",
      dateReserved: "2022-01-07T00:00:00",
      dateUpdated: "2024-08-03T03:21:49.173Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-0220
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 04:03
Severity ?
Summary
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T04:03:10.421Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "62718",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62718",
               },
               {
                  name: "FEDORA-2015-0804",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
               },
               {
                  name: "USN-2469-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-2469-1",
               },
               {
                  name: "MDVSA-2015:036",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
               },
               {
                  name: "62285",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62285",
               },
               {
                  name: "openSUSE-SU-2015:1598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
               },
               {
                  name: "openSUSE-SU-2015:0643",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
               },
               {
                  name: "62309",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62309",
               },
               {
                  name: "MDVSA-2015:109",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://advisories.mageia.org/MGASA-2015-0026.html",
               },
               {
                  name: "FEDORA-2015-0714",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \"\\njavascript:\" URL.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-20T16:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "62718",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62718",
            },
            {
               name: "FEDORA-2015-0804",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
            },
            {
               name: "USN-2469-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-2469-1",
            },
            {
               name: "MDVSA-2015:036",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
            },
            {
               name: "62285",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62285",
            },
            {
               name: "openSUSE-SU-2015:1598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
            },
            {
               name: "openSUSE-SU-2015:0643",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
            },
            {
               name: "62309",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62309",
            },
            {
               name: "MDVSA-2015:109",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://advisories.mageia.org/MGASA-2015-0026.html",
            },
            {
               name: "FEDORA-2015-0714",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2015-0220",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \"\\njavascript:\" URL.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "62718",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62718",
                  },
                  {
                     name: "FEDORA-2015-0804",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
                  },
                  {
                     name: "USN-2469-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-2469-1",
                  },
                  {
                     name: "MDVSA-2015:036",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
                  },
                  {
                     name: "62285",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62285",
                  },
                  {
                     name: "openSUSE-SU-2015:1598",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
                  },
                  {
                     name: "openSUSE-SU-2015:0643",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
                  },
                  {
                     name: "62309",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62309",
                  },
                  {
                     name: "MDVSA-2015:109",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
                  },
                  {
                     name: "http://advisories.mageia.org/MGASA-2015-0026.html",
                     refsource: "CONFIRM",
                     url: "http://advisories.mageia.org/MGASA-2015-0026.html",
                  },
                  {
                     name: "FEDORA-2015-0714",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-0220",
      datePublished: "2015-01-16T16:00:00",
      dateReserved: "2014-11-18T00:00:00",
      dateUpdated: "2024-08-06T04:03:10.421Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-5145
Vulnerability from cvelistv5
Published
2015-07-14 17:00
Modified
2024-08-06 06:32
Severity ?
Summary
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
References
https://security.gentoo.org/glsa/201510-06vendor-advisory, x_refsource_GENTOO
https://www.djangoproject.com/weblog/2015/jul/08/security-releases/x_refsource_CONFIRM
http://www.securityfocus.com/bid/75691vdb-entry, x_refsource_BID
http://www.securitytracker.com/id/1032820vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T06:32:32.865Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-201510-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201510-06",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
               },
               {
                  name: "75691",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75691",
               },
               {
                  name: "1032820",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032820",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-07-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-21T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "GLSA-201510-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201510-06",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
            },
            {
               name: "75691",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75691",
            },
            {
               name: "1032820",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032820",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-5145",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "GLSA-201510-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201510-06",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
                  },
                  {
                     name: "75691",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75691",
                  },
                  {
                     name: "1032820",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032820",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-5145",
      datePublished: "2015-07-14T17:00:00",
      dateReserved: "2015-06-29T00:00:00",
      dateUpdated: "2024-08-06T06:32:32.865Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-3730
Vulnerability from cvelistv5
Published
2014-05-16 15:00
Modified
2024-08-06 10:50
Severity ?
Summary
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
References
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-2934vendor-advisory, x_refsource_DEBIAN
http://ubuntu.com/usn/usn-2212-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/67410vdb-entry, x_refsource_BID
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://www.openwall.com/lists/oss-security/2014/05/15/3mailing-list, x_refsource_MLIST
https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2014/05/14/10mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T10:50:18.338Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "DSA-2934",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-2934",
               },
               {
                  name: "USN-2212-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-2212-1",
               },
               {
                  name: "67410",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/67410",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
               },
               {
                  name: "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-05-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by \"http:\\\\\\djangoproject.com.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "DSA-2934",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-2934",
            },
            {
               name: "USN-2212-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-2212-1",
            },
            {
               name: "67410",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/67410",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
            },
            {
               name: "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-3730",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by \"http:\\\\\\djangoproject.com.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "DSA-2934",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-2934",
                  },
                  {
                     name: "USN-2212-1",
                     refsource: "UBUNTU",
                     url: "http://ubuntu.com/usn/usn-2212-1",
                  },
                  {
                     name: "67410",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/67410",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "[oss-security] 20140514 Re: CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
                  },
                  {
                     name: "[oss-security] 20140514 CVE Reuest: Django: Malformed URLs from user input incorrectly validated",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-3730",
      datePublished: "2014-05-16T15:00:00",
      dateReserved: "2014-05-14T00:00:00",
      dateUpdated: "2024-08-06T10:50:18.338Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-24580
Vulnerability from cvelistv5
Published
2023-02-15 00:00
Modified
2025-02-13 16:44
Severity ?
Summary
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:03:18.895Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.1/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/02/14/1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/",
               },
               {
                  name: "[debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html",
               },
               {
                  name: "FEDORA-2023-3d775d93be",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
               },
               {
                  name: "FEDORA-2023-bde7913e5a",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
               },
               {
                  name: "FEDORA-2023-a74513bda8",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20230316-0006/",
               },
               {
                  name: "FEDORA-2023-8fed428c5e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
               },
               {
                  name: "FEDORA-2023-a53ab7c969",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-28T03:06:17.641Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.1/releases/security/",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/02/14/1",
            },
            {
               url: "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/",
            },
            {
               name: "[debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html",
            },
            {
               name: "FEDORA-2023-3d775d93be",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
            },
            {
               name: "FEDORA-2023-bde7913e5a",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
            },
            {
               name: "FEDORA-2023-a74513bda8",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20230316-0006/",
            },
            {
               name: "FEDORA-2023-8fed428c5e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
            },
            {
               name: "FEDORA-2023-a53ab7c969",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-24580",
      datePublished: "2023-02-15T00:00:00.000Z",
      dateReserved: "2023-01-27T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:44:19.791Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-45230
Vulnerability from cvelistv5
Published
2024-10-08 00:00
Modified
2024-10-30 16:33
Severity ?
Summary
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        lessThan: "5.1.1",
                        status: "affected",
                        version: "5.1",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.0.9",
                        status: "affected",
                        version: "5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.2.16",
                        status: "affected",
                        version: "4.2",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-45230",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-30T16:30:05.616132Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-120",
                        description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-30T16:33:50.329Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-10-08T15:05:33.553930",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-45230",
      datePublished: "2024-10-08T00:00:00",
      dateReserved: "2024-08-24T00:00:00",
      dateUpdated: "2024-10-30T16:33:50.329Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-41989
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-08-08 19:39
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        lessThan: "4.2.15",
                        status: "affected",
                        version: "4.2",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.0.8",
                        status: "affected",
                        version: "5.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-41989",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-08T19:34:43.299369Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-08T19:39:24.621Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-08-07T14:10:31.266105",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-41989",
      datePublished: "2024-08-07T00:00:00",
      dateReserved: "2024-07-25T00:00:00",
      dateUpdated: "2024-08-08T19:39:24.621Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-6044
Vulnerability from cvelistv5
Published
2013-10-04 17:00
Modified
2024-08-06 17:29
Severity ?
Summary
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T17:29:43.070Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "61777",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/61777",
               },
               {
                  name: "1028915",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1028915",
               },
               {
                  name: "openSUSE-SU-2013:1541",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a",
               },
               {
                  name: "54476",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/54476",
               },
               {
                  name: "RHSA-2013:1521",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
               },
               {
                  name: "[oss-security] 20130814 [CVE request] Django 1.4.6 security release",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/oss-sec/2013/q3/369",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
               },
               {
                  name: "django-issafeurl-xss(86437)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f",
               },
               {
                  name: "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/oss-sec/2013/q3/411",
               },
               {
                  name: "DSA-2740",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2013/dsa-2740",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-08-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by \"the login view in django.contrib.auth.views\" and the javascript: scheme.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-16T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "61777",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/61777",
            },
            {
               name: "1028915",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1028915",
            },
            {
               name: "openSUSE-SU-2013:1541",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a",
            },
            {
               name: "54476",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/54476",
            },
            {
               name: "RHSA-2013:1521",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
            },
            {
               name: "[oss-security] 20130814 [CVE request] Django 1.4.6 security release",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://seclists.org/oss-sec/2013/q3/369",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
            },
            {
               name: "django-issafeurl-xss(86437)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f",
            },
            {
               name: "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://seclists.org/oss-sec/2013/q3/411",
            },
            {
               name: "DSA-2740",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2013/dsa-2740",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2013-6044",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by \"the login view in django.contrib.auth.views\" and the javascript: scheme.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "61777",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/61777",
                  },
                  {
                     name: "1028915",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1028915",
                  },
                  {
                     name: "openSUSE-SU-2013:1541",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
                  },
                  {
                     name: "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a",
                  },
                  {
                     name: "54476",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/54476",
                  },
                  {
                     name: "RHSA-2013:1521",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
                  },
                  {
                     name: "[oss-security] 20130814 [CVE request] Django 1.4.6 security release",
                     refsource: "MLIST",
                     url: "http://seclists.org/oss-sec/2013/q3/369",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
                  },
                  {
                     name: "django-issafeurl-xss(86437)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437",
                  },
                  {
                     name: "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762",
                  },
                  {
                     name: "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f",
                  },
                  {
                     name: "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release",
                     refsource: "MLIST",
                     url: "http://seclists.org/oss-sec/2013/q3/411",
                  },
                  {
                     name: "DSA-2740",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2013/dsa-2740",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2013-6044",
      datePublished: "2013-10-04T17:00:00",
      dateReserved: "2013-10-04T00:00:00",
      dateUpdated: "2024-08-06T17:29:43.070Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-0697
Vulnerability from cvelistv5
Published
2011-02-14 20:00
Modified
2024-08-06 21:58
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.
References
http://secunia.com/advisories/43297third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/43382third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0439vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0429vdb-entry, x_refsource_VUPEN
http://openwall.com/lists/oss-security/2011/02/09/6mailing-list, x_refsource_MLIST
http://secunia.com/advisories/43230third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/43426third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=676359x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0372vdb-entry, x_refsource_VUPEN
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0441vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-1066-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/46296vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2011:031vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2011/dsa-2163vendor-advisory, x_refsource_DEBIAN
http://www.djangoproject.com/weblog/2011/feb/08/security/x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0388vdb-entry, x_refsource_VUPEN
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.htmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T21:58:26.093Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "43297",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43297",
               },
               {
                  name: "43382",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43382",
               },
               {
                  name: "ADV-2011-0439",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0439",
               },
               {
                  name: "ADV-2011-0429",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0429",
               },
               {
                  name: "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/02/09/6",
               },
               {
                  name: "43230",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43230",
               },
               {
                  name: "43426",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43426",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=676359",
               },
               {
                  name: "ADV-2011-0372",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0372",
               },
               {
                  name: "FEDORA-2011-1261",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
               },
               {
                  name: "ADV-2011-0441",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0441",
               },
               {
                  name: "USN-1066-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1066-1",
               },
               {
                  name: "46296",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/46296",
               },
               {
                  name: "MDVSA-2011:031",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
               },
               {
                  name: "DSA-2163",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2163",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
               },
               {
                  name: "ADV-2011-0388",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0388",
               },
               {
                  name: "FEDORA-2011-1235",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-02-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2011-02-23T10:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "43297",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43297",
            },
            {
               name: "43382",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43382",
            },
            {
               name: "ADV-2011-0439",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0439",
            },
            {
               name: "ADV-2011-0429",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0429",
            },
            {
               name: "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/02/09/6",
            },
            {
               name: "43230",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43230",
            },
            {
               name: "43426",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43426",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=676359",
            },
            {
               name: "ADV-2011-0372",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0372",
            },
            {
               name: "FEDORA-2011-1261",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
            },
            {
               name: "ADV-2011-0441",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0441",
            },
            {
               name: "USN-1066-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1066-1",
            },
            {
               name: "46296",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/46296",
            },
            {
               name: "MDVSA-2011:031",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
            },
            {
               name: "DSA-2163",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2163",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
            },
            {
               name: "ADV-2011-0388",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0388",
            },
            {
               name: "FEDORA-2011-1235",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2011-0697",
      datePublished: "2011-02-14T20:00:00",
      dateReserved: "2011-01-31T00:00:00",
      dateUpdated: "2024-08-06T21:58:26.093Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-28346
Vulnerability from cvelistv5
Published
2022-04-12 00:00
Modified
2025-02-13 16:32
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:56:14.796Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
               },
               {
                  name: "[debian-lts-announce] 20220414 [SECURITY] [DLA 2982-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220609-0002/",
               },
               {
                  name: "DSA-5254",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2022/dsa-5254",
               },
               {
                  name: "FEDORA-2023-8fed428c5e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
               },
               {
                  name: "FEDORA-2023-a53ab7c969",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-28T03:06:20.960Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
            },
            {
               url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
            },
            {
               name: "[debian-lts-announce] 20220414 [SECURITY] [DLA 2982-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20220609-0002/",
            },
            {
               name: "DSA-5254",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2022/dsa-5254",
            },
            {
               name: "FEDORA-2023-8fed428c5e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
            },
            {
               name: "FEDORA-2023-a53ab7c969",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-28346",
      datePublished: "2022-04-12T00:00:00.000Z",
      dateReserved: "2022-04-02T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:32:33.638Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-0696
Vulnerability from cvelistv5
Published
2011-02-14 20:00
Modified
2024-08-06 21:58
Severity ?
Summary
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
References
http://secunia.com/advisories/43297third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/43382third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0439vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0429vdb-entry, x_refsource_VUPEN
http://openwall.com/lists/oss-security/2011/02/09/6mailing-list, x_refsource_MLIST
http://secunia.com/advisories/43230third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/43426third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=676357x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0372vdb-entry, x_refsource_VUPEN
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0441vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-1066-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/46296vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2011:031vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2011/dsa-2163vendor-advisory, x_refsource_DEBIAN
http://www.djangoproject.com/weblog/2011/feb/08/security/x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0388vdb-entry, x_refsource_VUPEN
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.htmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T21:58:26.098Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "43297",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43297",
               },
               {
                  name: "43382",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43382",
               },
               {
                  name: "ADV-2011-0439",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0439",
               },
               {
                  name: "ADV-2011-0429",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0429",
               },
               {
                  name: "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/02/09/6",
               },
               {
                  name: "43230",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43230",
               },
               {
                  name: "43426",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43426",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=676357",
               },
               {
                  name: "ADV-2011-0372",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0372",
               },
               {
                  name: "FEDORA-2011-1261",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
               },
               {
                  name: "ADV-2011-0441",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0441",
               },
               {
                  name: "USN-1066-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1066-1",
               },
               {
                  name: "46296",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/46296",
               },
               {
                  name: "MDVSA-2011:031",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
               },
               {
                  name: "DSA-2163",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2163",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
               },
               {
                  name: "ADV-2011-0388",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0388",
               },
               {
                  name: "FEDORA-2011-1235",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-02-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a \"combination of browser plugins and redirects,\" a related issue to CVE-2011-0447.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2011-02-23T10:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "43297",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43297",
            },
            {
               name: "43382",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43382",
            },
            {
               name: "ADV-2011-0439",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0439",
            },
            {
               name: "ADV-2011-0429",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0429",
            },
            {
               name: "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/02/09/6",
            },
            {
               name: "43230",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43230",
            },
            {
               name: "43426",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43426",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=676357",
            },
            {
               name: "ADV-2011-0372",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0372",
            },
            {
               name: "FEDORA-2011-1261",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
            },
            {
               name: "ADV-2011-0441",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0441",
            },
            {
               name: "USN-1066-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1066-1",
            },
            {
               name: "46296",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/46296",
            },
            {
               name: "MDVSA-2011:031",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
            },
            {
               name: "DSA-2163",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2163",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
            },
            {
               name: "ADV-2011-0388",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0388",
            },
            {
               name: "FEDORA-2011-1235",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2011-0696",
      datePublished: "2011-02-14T20:00:00",
      dateReserved: "2011-01-31T00:00:00",
      dateUpdated: "2024-08-06T21:58:26.098Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-19844
Vulnerability from cvelistv5
Published
2019-12-18 18:07
Modified
2024-08-05 02:25
Severity ?
Summary
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:25:12.834Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/",
               },
               {
                  name: "USN-4224-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4224-1/",
               },
               {
                  name: "DSA-4598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4598",
               },
               {
                  name: "20200108 [SECURITY] [DSA 4598-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2020/Jan/9",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200110-0003/",
               },
               {
                  name: "FEDORA-2020-adb4f0143a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-01T01:06:13",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/",
            },
            {
               name: "USN-4224-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4224-1/",
            },
            {
               name: "DSA-4598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4598",
            },
            {
               name: "20200108 [SECURITY] [DSA 4598-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2020/Jan/9",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200110-0003/",
            },
            {
               name: "FEDORA-2020-adb4f0143a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-19844",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/",
                  },
                  {
                     name: "USN-4224-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4224-1/",
                  },
                  {
                     name: "DSA-4598",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4598",
                  },
                  {
                     name: "20200108 [SECURITY] [DSA 4598-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2020/Jan/9",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200110-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200110-0003/",
                  },
                  {
                     name: "FEDORA-2020-adb4f0143a",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-19844",
      datePublished: "2019-12-18T18:07:11",
      dateReserved: "2019-12-17T00:00:00",
      dateUpdated: "2024-08-05T02:25:12.834Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-4138
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T00:01:51.120Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "openSUSE-SU-2012:0653",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "https://hermes.opensuse.org/messages/14700881",
               },
               {
                  name: "DSA-2332",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2332",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
               },
               {
                  name: "46614",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/46614",
               },
               {
                  name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/11/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
               },
               {
                  name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/13/2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/09/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-09-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-17T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "openSUSE-SU-2012:0653",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "https://hermes.opensuse.org/messages/14700881",
            },
            {
               name: "DSA-2332",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2332",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
            },
            {
               name: "46614",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/46614",
            },
            {
               name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/11/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
            },
            {
               name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/13/2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/09/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-4138",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "openSUSE-SU-2012:0653",
                     refsource: "SUSE",
                     url: "https://hermes.opensuse.org/messages/14700881",
                  },
                  {
                     name: "DSA-2332",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2011/dsa-2332",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                  },
                  {
                     name: "46614",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/46614",
                  },
                  {
                     name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/11/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                  },
                  {
                     name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/13/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/09/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/09/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-4138",
      datePublished: "2011-10-19T10:00:00",
      dateReserved: "2011-10-19T00:00:00",
      dateUpdated: "2024-08-07T00:01:51.120Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-0472
Vulnerability from cvelistv5
Published
2014-04-23 14:00
Modified
2024-08-06 09:20
Severity ?
Summary
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."
References
http://www.ubuntu.com/usn/USN-2169-1vendor-advisory, x_refsource_UBUNTU
https://www.djangoproject.com/weblog/2014/apr/21/security/x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-0457.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-2934vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2014-0456.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:20:17.941Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-2169-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2169-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
               },
               {
                  name: "RHSA-2014:0457",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
               },
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "DSA-2934",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-2934",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "RHSA-2014:0456",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-04-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a \"dotted Python path.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               name: "USN-2169-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2169-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
            },
            {
               name: "RHSA-2014:0457",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
            },
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "DSA-2934",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-2934",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "RHSA-2014:0456",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-0472",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a \"dotted Python path.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-2169-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2169-1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
                  },
                  {
                     name: "RHSA-2014:0457",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
                  },
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "DSA-2934",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-2934",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "RHSA-2014:0456",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-0472",
      datePublished: "2014-04-23T14:00:00",
      dateReserved: "2013-12-19T00:00:00",
      dateUpdated: "2024-08-06T09:20:17.941Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-41164
Vulnerability from cvelistv5
Published
2023-11-03 00:00
Modified
2024-08-02 18:54
Severity ?
Summary
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T18:54:03.498Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.2/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/",
               },
               {
                  name: "FEDORA-2023-a67af7d8f4",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231214-0002/",
               },
               {
                  name: "FEDORA-2024-84fbbbb914",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-20T03:06:02.315105",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.2/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/",
            },
            {
               name: "FEDORA-2023-a67af7d8f4",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231214-0002/",
            },
            {
               name: "FEDORA-2024-84fbbbb914",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-41164",
      datePublished: "2023-11-03T00:00:00",
      dateReserved: "2023-08-24T00:00:00",
      dateUpdated: "2024-08-02T18:54:03.498Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-4535
Vulnerability from cvelistv5
Published
2011-01-10 19:18
Modified
2024-08-07 03:51
Severity ?
Summary
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:51:17.300Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://code.djangoproject.com/changeset/15032",
               },
               {
                  name: "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
               },
               {
                  name: "USN-1040-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1040-1",
               },
               {
                  name: "45563",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/45563",
               },
               {
                  name: "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
               },
               {
                  name: "42913",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/42913",
               },
               {
                  name: "ADV-2011-0048",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0048",
               },
               {
                  name: "ADV-2011-0098",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0098",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
               },
               {
                  name: "FEDORA-2011-0096",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
               },
               {
                  name: "42715",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/42715",
               },
               {
                  name: "FEDORA-2011-0120",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
               },
               {
                  name: "42827",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/42827",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-12-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2011-01-19T10:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://code.djangoproject.com/changeset/15032",
            },
            {
               name: "[oss-security] 20101223 CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
            },
            {
               name: "USN-1040-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1040-1",
            },
            {
               name: "45563",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/45563",
            },
            {
               name: "[oss-security] 20110103 Re: CVE Request -- Django 1.2.4, Django 1.1.3 and Django 1.3 beta 1 -- addressing two security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
            },
            {
               name: "42913",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/42913",
            },
            {
               name: "ADV-2011-0048",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0048",
            },
            {
               name: "ADV-2011-0098",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0098",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
            },
            {
               name: "FEDORA-2011-0096",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
            },
            {
               name: "42715",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/42715",
            },
            {
               name: "FEDORA-2011-0120",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
            },
            {
               name: "42827",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/42827",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-4535",
      datePublished: "2011-01-10T19:18:00",
      dateReserved: "2010-12-09T00:00:00",
      dateUpdated: "2024-08-07T03:51:17.300Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2012-3442
Vulnerability from cvelistv5
Published
2012-07-31 17:00
Modified
2024-08-06 20:05
Severity ?
Summary
The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T20:05:12.572Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
               },
               {
                  name: "MDVSA-2012:143",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
               },
               {
                  name: "USN-1560-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1560-1",
               },
               {
                  name: "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
               },
               {
                  name: "DSA-2529",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2012/dsa-2529",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-07-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2012-09-29T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
            },
            {
               name: "MDVSA-2012:143",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
            },
            {
               name: "USN-1560-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1560-1",
            },
            {
               name: "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
            },
            {
               name: "DSA-2529",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2012/dsa-2529",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2012-3442",
      datePublished: "2012-07-31T17:00:00",
      dateReserved: "2012-06-14T00:00:00",
      dateUpdated: "2024-08-06T20:05:12.572Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-16984
Vulnerability from cvelistv5
Published
2018-10-02 18:00
Modified
2024-08-05 10:39
Severity ?
Summary
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T10:39:58.059Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2018/oct/01/security-release/",
               },
               {
                  name: "1041749",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041749",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190502-0009/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2018-10-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the \"view\" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-05-02T09:06:06",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2018/oct/01/security-release/",
            },
            {
               name: "1041749",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041749",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190502-0009/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2018-16984",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the \"view\" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2018/oct/01/security-release/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2018/oct/01/security-release/",
                  },
                  {
                     name: "1041749",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041749",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190502-0009/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190502-0009/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-16984",
      datePublished: "2018-10-02T18:00:00",
      dateReserved: "2018-09-13T00:00:00",
      dateUpdated: "2024-08-05T10:39:58.059Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-2048
Vulnerability from cvelistv5
Published
2016-02-08 19:00
Modified
2024-08-05 23:17
Severity ?
Summary
Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T23:17:50.372Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/",
               },
               {
                  name: "82329",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/82329",
               },
               {
                  name: "1034894",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1034894",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-02-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the \"Save as New\" option when editing objects and leveraging the \"change\" permission.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/",
            },
            {
               name: "82329",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/82329",
            },
            {
               name: "1034894",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1034894",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-2048",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the \"Save as New\" option when editing objects and leveraging the \"change\" permission.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/",
                  },
                  {
                     name: "82329",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/82329",
                  },
                  {
                     name: "1034894",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1034894",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-2048",
      datePublished: "2016-02-08T19:00:00",
      dateReserved: "2016-01-24T00:00:00",
      dateUpdated: "2024-08-05T23:17:50.372Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-45116
Vulnerability from cvelistv5
Published
2022-01-04 23:12
Modified
2024-08-04 04:39
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:39:20.434Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-11T02:06:28",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-45116",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/4.0/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/4.0/releases/security/",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20220121-0005/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
                  },
                  {
                     name: "FEDORA-2022-e7fd530688",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-45116",
      datePublished: "2022-01-04T23:12:43",
      dateReserved: "2021-12-16T00:00:00",
      dateUpdated: "2024-08-04T04:39:20.434Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-7401
Vulnerability from cvelistv5
Published
2016-10-03 18:00
Modified
2024-08-06 01:57
Severity ?
Summary
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
References
http://www.debian.org/security/2016/dsa-3678vendor-advisory, x_refsource_DEBIAN
http://rhn.redhat.com/errata/RHSA-2016-2040.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2016-2043.htmlvendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1036899vdb-entry, x_refsource_SECTRACK
http://rhn.redhat.com/errata/RHSA-2016-2041.htmlvendor-advisory, x_refsource_REDHAT
https://www.djangoproject.com/weblog/2016/sep/26/security-releases/x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2016-2042.htmlvendor-advisory, x_refsource_REDHAT
http://www.ubuntu.com/usn/USN-3089-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/93182vdb-entry, x_refsource_BID
http://rhn.redhat.com/errata/RHSA-2016-2038.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2016-2039.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:57:47.529Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "DSA-3678",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2016/dsa-3678",
               },
               {
                  name: "RHSA-2016:2040",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2040.html",
               },
               {
                  name: "RHSA-2016:2043",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2043.html",
               },
               {
                  name: "1036899",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1036899",
               },
               {
                  name: "RHSA-2016:2041",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2041.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/",
               },
               {
                  name: "RHSA-2016:2042",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2042.html",
               },
               {
                  name: "USN-3089-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-3089-1",
               },
               {
                  name: "93182",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/93182",
               },
               {
                  name: "RHSA-2016:2038",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2038.html",
               },
               {
                  name: "RHSA-2016:2039",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-2039.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-09-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-04T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "DSA-3678",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2016/dsa-3678",
            },
            {
               name: "RHSA-2016:2040",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-2040.html",
            },
            {
               name: "RHSA-2016:2043",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-2043.html",
            },
            {
               name: "1036899",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1036899",
            },
            {
               name: "RHSA-2016:2041",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-2041.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/",
            },
            {
               name: "RHSA-2016:2042",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-2042.html",
            },
            {
               name: "USN-3089-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-3089-1",
            },
            {
               name: "93182",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/93182",
            },
            {
               name: "RHSA-2016:2038",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-2038.html",
            },
            {
               name: "RHSA-2016:2039",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-2039.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-7401",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "DSA-3678",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2016/dsa-3678",
                  },
                  {
                     name: "RHSA-2016:2040",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2040.html",
                  },
                  {
                     name: "RHSA-2016:2043",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2043.html",
                  },
                  {
                     name: "1036899",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1036899",
                  },
                  {
                     name: "RHSA-2016:2041",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2041.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/",
                  },
                  {
                     name: "RHSA-2016:2042",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2042.html",
                  },
                  {
                     name: "USN-3089-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-3089-1",
                  },
                  {
                     name: "93182",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/93182",
                  },
                  {
                     name: "RHSA-2016:2038",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2038.html",
                  },
                  {
                     name: "RHSA-2016:2039",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-2039.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-7401",
      datePublished: "2016-10-03T18:00:00",
      dateReserved: "2016-09-09T00:00:00",
      dateUpdated: "2024-08-06T01:57:47.529Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-12781
Vulnerability from cvelistv5
Published
2019-07-01 13:56
Modified
2024-08-04 23:32
Severity ?
Summary
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T23:32:54.914Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/",
               },
               {
                  name: "[oss-security] 20190701 Django: CVE-2019-12781: Incorrect HTTP detection with reverse-proxy connecting via HTTPS",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/07/01/3",
               },
               {
                  name: "USN-4043-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4043-1/",
               },
               {
                  name: "109018",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/109018",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190705-0002/",
               },
               {
                  name: "DSA-4476",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4476",
               },
               {
                  name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Jul/10",
               },
               {
                  name: "FEDORA-2019-d9aa58d863",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/",
               },
               {
                  name: "openSUSE-SU-2019:1839",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
               },
               {
                  name: "openSUSE-SU-2019:1872",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-08-14T14:06:07",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/",
            },
            {
               name: "[oss-security] 20190701 Django: CVE-2019-12781: Incorrect HTTP detection with reverse-proxy connecting via HTTPS",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/07/01/3",
            },
            {
               name: "USN-4043-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4043-1/",
            },
            {
               name: "109018",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/109018",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190705-0002/",
            },
            {
               name: "DSA-4476",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4476",
            },
            {
               name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Jul/10",
            },
            {
               name: "FEDORA-2019-d9aa58d863",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/",
            },
            {
               name: "openSUSE-SU-2019:1839",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
            },
            {
               name: "openSUSE-SU-2019:1872",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-12781",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/",
                  },
                  {
                     name: "[oss-security] 20190701 Django: CVE-2019-12781: Incorrect HTTP detection with reverse-proxy connecting via HTTPS",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/07/01/3",
                  },
                  {
                     name: "USN-4043-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4043-1/",
                  },
                  {
                     name: "109018",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/109018",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190705-0002/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190705-0002/",
                  },
                  {
                     name: "DSA-4476",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4476",
                  },
                  {
                     name: "20190708 [SECURITY] [DSA 4476-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Jul/10",
                  },
                  {
                     name: "FEDORA-2019-d9aa58d863",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/",
                  },
                  {
                     name: "openSUSE-SU-2019:1839",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
                  },
                  {
                     name: "openSUSE-SU-2019:1872",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-12781",
      datePublished: "2019-07-01T13:56:37",
      dateReserved: "2019-06-10T00:00:00",
      dateUpdated: "2024-08-04T23:32:54.914Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-4249
Vulnerability from cvelistv5
Published
2013-10-04 17:00
Modified
2024-08-06 16:38
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T16:38:01.847Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1028915",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1028915",
               },
               {
                  name: "54476",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/54476",
               },
               {
                  name: "[oss-security] 20130814 [CVE request] Django 1.4.6 security release",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/oss-sec/2013/q3/369",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78",
               },
               {
                  name: "django-administrative-xss(86438)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560",
               },
               {
                  name: "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/oss-sec/2013/q3/411",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-08-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "1028915",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1028915",
            },
            {
               name: "54476",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/54476",
            },
            {
               name: "[oss-security] 20130814 [CVE request] Django 1.4.6 security release",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://seclists.org/oss-sec/2013/q3/369",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78",
            },
            {
               name: "django-administrative-xss(86438)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560",
            },
            {
               name: "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://seclists.org/oss-sec/2013/q3/411",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2013-4249",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1028915",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1028915",
                  },
                  {
                     name: "54476",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/54476",
                  },
                  {
                     name: "[oss-security] 20130814 [CVE request] Django 1.4.6 security release",
                     refsource: "MLIST",
                     url: "http://seclists.org/oss-sec/2013/q3/369",
                  },
                  {
                     name: "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78",
                  },
                  {
                     name: "django-administrative-xss(86438)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
                  },
                  {
                     name: "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560",
                     refsource: "CONFIRM",
                     url: "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560",
                  },
                  {
                     name: "[oss-security] 20130819 Re: [CVE request] Django 1.4.6 security release",
                     refsource: "MLIST",
                     url: "http://seclists.org/oss-sec/2013/q3/411",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2013-4249",
      datePublished: "2013-10-04T17:00:00",
      dateReserved: "2013-06-12T00:00:00",
      dateUpdated: "2024-08-06T16:38:01.847Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-0698
Vulnerability from cvelistv5
Published
2011-02-14 20:00
Modified
2024-08-06 21:58
Severity ?
Summary
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
References
http://www.vupen.com/english/advisories/2011/0439vdb-entry, x_refsource_VUPEN
http://openwall.com/lists/oss-security/2011/02/09/6mailing-list, x_refsource_MLIST
http://secunia.com/advisories/43230third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0372vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/46296vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2011:031vendor-advisory, x_refsource_MANDRIVA
http://www.djangoproject.com/weblog/2011/feb/08/security/x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T21:58:26.134Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ADV-2011-0439",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0439",
               },
               {
                  name: "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/02/09/6",
               },
               {
                  name: "43230",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43230",
               },
               {
                  name: "ADV-2011-0372",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0372",
               },
               {
                  name: "46296",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/46296",
               },
               {
                  name: "MDVSA-2011:031",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-02-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2011-02-23T10:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "ADV-2011-0439",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0439",
            },
            {
               name: "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/02/09/6",
            },
            {
               name: "43230",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43230",
            },
            {
               name: "ADV-2011-0372",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0372",
            },
            {
               name: "46296",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/46296",
            },
            {
               name: "MDVSA-2011:031",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2011-0698",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "ADV-2011-0439",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2011/0439",
                  },
                  {
                     name: "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/02/09/6",
                  },
                  {
                     name: "43230",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/43230",
                  },
                  {
                     name: "ADV-2011-0372",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2011/0372",
                  },
                  {
                     name: "46296",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/46296",
                  },
                  {
                     name: "MDVSA-2011:031",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
                  },
                  {
                     name: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
                     refsource: "CONFIRM",
                     url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2011-0698",
      datePublished: "2011-02-14T20:00:00",
      dateReserved: "2011-01-31T00:00:00",
      dateUpdated: "2024-08-06T21:58:26.134Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-14233
Vulnerability from cvelistv5
Published
2019-08-02 14:31
Modified
2024-08-05 00:12
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:12:42.524Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
               },
               {
                  name: "openSUSE-SU-2019:1839",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
               },
               {
                  name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Aug/15",
               },
               {
                  name: "DSA-4498",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4498",
               },
               {
                  name: "openSUSE-SU-2019:1872",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
               },
               {
                  name: "FEDORA-2019-647f74ce51",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-01T01:06:14",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
            },
            {
               name: "openSUSE-SU-2019:1839",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
            },
            {
               name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Aug/15",
            },
            {
               name: "DSA-4498",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2019/dsa-4498",
            },
            {
               name: "openSUSE-SU-2019:1872",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
            },
            {
               name: "FEDORA-2019-647f74ce51",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-14233",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
                  },
                  {
                     name: "openSUSE-SU-2019:1839",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
                  },
                  {
                     name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Aug/15",
                  },
                  {
                     name: "DSA-4498",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2019/dsa-4498",
                  },
                  {
                     name: "openSUSE-SU-2019:1872",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
                  },
                  {
                     name: "FEDORA-2019-647f74ce51",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190828-0002/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
                  },
                  {
                     name: "GLSA-202004-17",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202004-17",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-14233",
      datePublished: "2019-08-02T14:31:09",
      dateReserved: "2019-07-22T00:00:00",
      dateUpdated: "2024-08-05T00:12:42.524Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7537
Vulnerability from cvelistv5
Published
2018-03-09 20:00
Modified
2024-08-05 06:31
Severity ?
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
References
https://usn.ubuntu.com/3591-1/vendor-advisory, x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/03/msg00006.htmlmailing-list, x_refsource_MLIST
https://www.djangoproject.com/weblog/2018/mar/06/security-releases/x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2018:2927vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/103357vdb-entry, x_refsource_BID
https://access.redhat.com/errata/RHSA-2019:0265vendor-advisory, x_refsource_REDHAT
https://www.debian.org/security/2018/dsa-4161vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:31:04.518Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-3591-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3591-1/",
               },
               {
                  name: "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
               },
               {
                  name: "RHSA-2018:2927",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2927",
               },
               {
                  name: "103357",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/103357",
               },
               {
                  name: "RHSA-2019:0265",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:0265",
               },
               {
                  name: "DSA-4161",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4161",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2018-03-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-02-04T10:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-3591-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3591-1/",
            },
            {
               name: "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
            },
            {
               name: "RHSA-2018:2927",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:2927",
            },
            {
               name: "103357",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/103357",
            },
            {
               name: "RHSA-2019:0265",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:0265",
            },
            {
               name: "DSA-4161",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2018/dsa-4161",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2018-7537",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-3591-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3591-1/",
                  },
                  {
                     name: "[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
                  },
                  {
                     name: "RHSA-2018:2927",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:2927",
                  },
                  {
                     name: "103357",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/103357",
                  },
                  {
                     name: "RHSA-2019:0265",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:0265",
                  },
                  {
                     name: "DSA-4161",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2018/dsa-4161",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-7537",
      datePublished: "2018-03-09T20:00:00",
      dateReserved: "2018-02-26T00:00:00",
      dateUpdated: "2024-08-05T06:31:04.518Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-42005
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-09-03 17:36
Severity ?
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        lessThan: "4.2.15",
                        status: "affected",
                        version: "4.2",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.0.8",
                        status: "affected",
                        version: "5.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-42005",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-16T20:19:17.076015Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-89",
                        description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-03T17:36:29.599Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-08-07T14:14:51.264922",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-42005",
      datePublished: "2024-08-07T00:00:00",
      dateReserved: "2024-07-26T00:00:00",
      dateUpdated: "2024-09-03T17:36:29.599Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-23969
Vulnerability from cvelistv5
Published
2023-02-01 00:00
Modified
2025-02-13 16:44
Severity ?
Summary
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:49:08.226Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.1/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/",
               },
               {
                  name: "[debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20230302-0007/",
               },
               {
                  name: "FEDORA-2023-8fed428c5e",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
               },
               {
                  name: "FEDORA-2023-a53ab7c969",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-28T03:06:12.957Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.1/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/",
            },
            {
               name: "[debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20230302-0007/",
            },
            {
               name: "FEDORA-2023-8fed428c5e",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
            },
            {
               name: "FEDORA-2023-a53ab7c969",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-23969",
      datePublished: "2023-02-01T00:00:00.000Z",
      dateReserved: "2023-01-20T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:44:12.812Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-32052
Vulnerability from cvelistv5
Published
2021-05-06 15:49
Modified
2024-08-03 23:17
Severity ?
Summary
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T23:17:28.409Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.2/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2021/05/06/1",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
               },
               {
                  name: "FEDORA-2021-01044b8a59",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210611-0002/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-06-11T10:06:12",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.2/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.openwall.com/lists/oss-security/2021/05/06/1",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
            },
            {
               name: "FEDORA-2021-01044b8a59",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20210611-0002/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-32052",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.2/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.2/releases/security/",
                  },
                  {
                     name: "http://www.openwall.com/lists/oss-security/2021/05/06/1",
                     refsource: "MISC",
                     url: "http://www.openwall.com/lists/oss-security/2021/05/06/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
                     refsource: "MISC",
                     url: "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
                  },
                  {
                     name: "FEDORA-2021-01044b8a59",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20210611-0002/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20210611-0002/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-32052",
      datePublished: "2021-05-06T15:49:20",
      dateReserved: "2021-05-05T00:00:00",
      dateUpdated: "2024-08-03T23:17:28.409Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-13254
Vulnerability from cvelistv5
Published
2020-06-03 13:11
Modified
2024-08-04 12:11
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.484Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-4381-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4381-1/",
               },
               {
                  name: "USN-4381-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4381-2/",
               },
               {
                  name: "[debian-lts-announce] 20200612 [SECURITY] [DLA 2233-2] python-django regression update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html",
               },
               {
                  name: "DSA-4705",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4705",
               },
               {
                  name: "FEDORA-2020-c2639662af",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.0/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-20T14:42:06",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-4381-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4381-1/",
            },
            {
               name: "USN-4381-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4381-2/",
            },
            {
               name: "[debian-lts-announce] 20200612 [SECURITY] [DLA 2233-2] python-django regression update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html",
            },
            {
               name: "DSA-4705",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4705",
            },
            {
               name: "FEDORA-2020-c2639662af",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.0/releases/security/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-13254",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-4381-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4381-1/",
                  },
                  {
                     name: "USN-4381-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4381-2/",
                  },
                  {
                     name: "[debian-lts-announce] 20200612 [SECURITY] [DLA 2233-2] python-django regression update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html",
                  },
                  {
                     name: "DSA-4705",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4705",
                  },
                  {
                     name: "FEDORA-2020-c2639662af",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.0/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.0/releases/security/",
                  },
                  {
                     name: "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
                     refsource: "MISC",
                     url: "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0002/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-13254",
      datePublished: "2020-06-03T13:11:57",
      dateReserved: "2020-05-21T00:00:00",
      dateUpdated: "2024-08-04T12:11:19.484Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-0474
Vulnerability from cvelistv5
Published
2014-04-23 14:00
Modified
2024-08-06 09:20
Severity ?
Summary
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to "MySQL typecasting."
References
http://www.ubuntu.com/usn/USN-2169-1vendor-advisory, x_refsource_UBUNTU
https://www.djangoproject.com/weblog/2014/apr/21/security/x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-0457.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/61281third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-2934vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2014-0456.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T09:20:18.434Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-2169-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2169-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
               },
               {
                  name: "RHSA-2014:0457",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
               },
               {
                  name: "61281",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61281",
               },
               {
                  name: "DSA-2934",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-2934",
               },
               {
                  name: "openSUSE-SU-2014:1132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
               },
               {
                  name: "RHSA-2014:0456",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-04-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to \"MySQL typecasting.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T17:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               name: "USN-2169-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2169-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
            },
            {
               name: "RHSA-2014:0457",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
            },
            {
               name: "61281",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61281",
            },
            {
               name: "DSA-2934",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-2934",
            },
            {
               name: "openSUSE-SU-2014:1132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
            },
            {
               name: "RHSA-2014:0456",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2014-0474",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to \"MySQL typecasting.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-2169-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2169-1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
                  },
                  {
                     name: "RHSA-2014:0457",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
                  },
                  {
                     name: "61281",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61281",
                  },
                  {
                     name: "DSA-2934",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-2934",
                  },
                  {
                     name: "openSUSE-SU-2014:1132",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
                  },
                  {
                     name: "RHSA-2014:0456",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2014-0474",
      datePublished: "2014-04-23T14:00:00",
      dateReserved: "2013-12-19T00:00:00",
      dateUpdated: "2024-08-06T09:20:18.434Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-41991
Vulnerability from cvelistv5
Published
2024-08-07 00:00
Modified
2024-08-12 15:56
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        lessThan: "4.2.15",
                        status: "affected",
                        version: "4.2",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.0.8",
                        status: "affected",
                        version: "5.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-41991",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-07T17:57:11.874865Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-130",
                        description: "CWE-130 Improper Handling of Length Parameter Inconsistency",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-12T15:56:42.887Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-08-07T14:13:02.341557",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-41991",
      datePublished: "2024-08-07T00:00:00",
      dateReserved: "2024-07-25T00:00:00",
      dateUpdated: "2024-08-12T15:56:42.887Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2012-3443
Vulnerability from cvelistv5
Published
2012-07-31 17:00
Modified
2024-08-06 20:05
Severity ?
Summary
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T20:05:12.549Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
               },
               {
                  name: "MDVSA-2012:143",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
               },
               {
                  name: "USN-1560-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1560-1",
               },
               {
                  name: "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
               },
               {
                  name: "DSA-2529",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2012/dsa-2529",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-07-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2012-09-29T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20120730 CVE Request: Django 1.3.1 and 1.4.0 security issues",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
            },
            {
               name: "MDVSA-2012:143",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
            },
            {
               name: "USN-1560-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1560-1",
            },
            {
               name: "[oss-security] 20120730 Re: CVE Request: Django 1.3.1 and 1.4.0 security issues",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
            },
            {
               name: "DSA-2529",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2012/dsa-2529",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2012-3443",
      datePublished: "2012-07-31T17:00:00",
      dateReserved: "2012-06-14T00:00:00",
      dateUpdated: "2024-08-06T20:05:12.549Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-0306
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 14:25
Severity ?
Summary
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
References
https://www.djangoproject.com/weblog/2013/feb/19/security/x_refsource_CONFIRM
http://ubuntu.com/usn/usn-1757-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2013/dsa-2634vendor-advisory, x_refsource_DEBIAN
http://rhn.redhat.com/errata/RHSA-2013-0670.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T14:25:08.778Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
               },
               {
                  name: "USN-1757-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-1757-1",
               },
               {
                  name: "DSA-2634",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2013/dsa-2634",
               },
               {
                  name: "RHSA-2013:0670",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-02-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-05-15T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
            },
            {
               name: "USN-1757-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-1757-1",
            },
            {
               name: "DSA-2634",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2013/dsa-2634",
            },
            {
               name: "RHSA-2013:0670",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2013-0306",
      datePublished: "2013-05-02T14:00:00",
      dateReserved: "2012-12-06T00:00:00",
      dateUpdated: "2024-08-06T14:25:08.778Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-5963
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 07:06
Severity ?
Summary
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T07:06:34.935Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FEDORA-2015-1dd5bc998f",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
               },
               {
                  name: "openSUSE-SU-2015:1580",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html",
               },
               {
                  name: "RHSA-2015:1894",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
               },
               {
                  name: "DSA-3338",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3338",
               },
               {
                  name: "1033318",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1033318",
               },
               {
                  name: "RHSA-2015:1767",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
               },
               {
                  name: "openSUSE-SU-2015:1598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
               },
               {
                  name: "USN-2720-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2720-1",
               },
               {
                  name: "RHSA-2015:1766",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
               },
               {
                  name: "RHSA-2015:1876",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2015:1876",
               },
               {
                  name: "76428",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76428",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-08-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-02T17:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FEDORA-2015-1dd5bc998f",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
            },
            {
               name: "openSUSE-SU-2015:1580",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html",
            },
            {
               name: "RHSA-2015:1894",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
            },
            {
               name: "DSA-3338",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3338",
            },
            {
               name: "1033318",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1033318",
            },
            {
               name: "RHSA-2015:1767",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
            },
            {
               name: "openSUSE-SU-2015:1598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
            },
            {
               name: "USN-2720-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2720-1",
            },
            {
               name: "RHSA-2015:1766",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
            },
            {
               name: "RHSA-2015:1876",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2015:1876",
            },
            {
               name: "76428",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76428",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-5963",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FEDORA-2015-1dd5bc998f",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
                  },
                  {
                     name: "openSUSE-SU-2015:1580",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html",
                  },
                  {
                     name: "RHSA-2015:1894",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
                  },
                  {
                     name: "DSA-3338",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3338",
                  },
                  {
                     name: "1033318",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1033318",
                  },
                  {
                     name: "RHSA-2015:1767",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
                  },
                  {
                     name: "openSUSE-SU-2015:1598",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
                  },
                  {
                     name: "USN-2720-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2720-1",
                  },
                  {
                     name: "RHSA-2015:1766",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
                  },
                  {
                     name: "RHSA-2015:1876",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2015:1876",
                  },
                  {
                     name: "76428",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76428",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
                     refsource: "MISC",
                     url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-5963",
      datePublished: "2015-08-24T14:00:00",
      dateReserved: "2015-08-07T00:00:00",
      dateUpdated: "2024-08-06T07:06:34.935Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-45231
Vulnerability from cvelistv5
Published
2024-10-08 00:00
Modified
2024-10-30 16:37
Severity ?
Summary
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "django",
                  vendor: "djangoproject",
                  versions: [
                     {
                        lessThan: "5.1.1",
                        status: "affected",
                        version: "5.1",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.0.9",
                        status: "affected",
                        version: "5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.2.16",
                        status: "affected",
                        version: "4.2",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-45231",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-30T16:35:34.672082Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-203",
                        description: "CWE-203 Observable Discrepancy",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-30T16:37:12.474Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-10-08T15:12:36.486526",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-45231",
      datePublished: "2024-10-08T00:00:00",
      dateReserved: "2024-08-24T00:00:00",
      dateUpdated: "2024-10-30T16:37:12.474Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-13596
Vulnerability from cvelistv5
Published
2020-06-03 13:13
Modified
2024-08-04 12:25
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:25:16.180Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-4381-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4381-1/",
               },
               {
                  name: "USN-4381-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4381-2/",
               },
               {
                  name: "DSA-4705",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4705",
               },
               {
                  name: "FEDORA-2020-c2639662af",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.0/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-20T14:42:06",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-4381-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4381-1/",
            },
            {
               name: "USN-4381-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4381-2/",
            },
            {
               name: "DSA-4705",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4705",
            },
            {
               name: "FEDORA-2020-c2639662af",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.0/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-13596",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-4381-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4381-1/",
                  },
                  {
                     name: "USN-4381-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4381-2/",
                  },
                  {
                     name: "DSA-4705",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4705",
                  },
                  {
                     name: "FEDORA-2020-c2639662af",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.0/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.0/releases/security/",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0002/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
                  },
                  {
                     name: "https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-13596",
      datePublished: "2020-06-03T13:13:55",
      dateReserved: "2020-05-26T00:00:00",
      dateUpdated: "2024-08-04T12:25:16.180Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-31542
Vulnerability from cvelistv5
Published
2021-05-05 00:00
Modified
2024-08-03 23:03
Severity ?
Summary
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T23:03:33.545Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.2/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2021/05/04/3",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/may/04/security-releases/",
               },
               {
                  name: "[debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html",
               },
               {
                  name: "FEDORA-2021-01044b8a59",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210618-0001/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-07T21:59:18.604732",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/3.2/releases/security/",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2021/05/04/3",
            },
            {
               url: "https://www.djangoproject.com/weblog/2021/may/04/security-releases/",
            },
            {
               name: "[debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html",
            },
            {
               name: "FEDORA-2021-01044b8a59",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20210618-0001/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
            {
               url: "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d",
            },
            {
               url: "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48",
            },
            {
               url: "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-31542",
      datePublished: "2021-05-05T00:00:00",
      dateReserved: "2021-04-22T00:00:00",
      dateUpdated: "2024-08-03T23:03:33.545Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-4136
Vulnerability from cvelistv5
Published
2011-10-19 10:00
Modified
2024-08-07 00:01
Severity ?
Summary
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T00:01:50.498Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "openSUSE-SU-2012:0653",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "https://hermes.opensuse.org/messages/14700881",
               },
               {
                  name: "DSA-2332",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2332",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
               },
               {
                  name: "46614",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/46614",
               },
               {
                  name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/11/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
               },
               {
                  name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/09/13/2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2011/sep/09/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-09-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-01-17T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "openSUSE-SU-2012:0653",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "https://hermes.opensuse.org/messages/14700881",
            },
            {
               name: "DSA-2332",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2332",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
            },
            {
               name: "46614",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/46614",
            },
            {
               name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/11/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
            },
            {
               name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/09/13/2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2011/sep/09/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-4136",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "openSUSE-SU-2012:0653",
                     refsource: "SUSE",
                     url: "https://hermes.opensuse.org/messages/14700881",
                  },
                  {
                     name: "DSA-2332",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2011/dsa-2332",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
                  },
                  {
                     name: "46614",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/46614",
                  },
                  {
                     name: "[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/11/1",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
                  },
                  {
                     name: "[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2011/09/13/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2011/sep/09/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2011/sep/09/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-4136",
      datePublished: "2011-10-19T10:00:00",
      dateReserved: "2011-10-19T00:00:00",
      dateUpdated: "2024-08-07T00:01:50.498Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-23833
Vulnerability from cvelistv5
Published
2022-02-03 00:00
Modified
2024-08-03 03:51
Severity ?
Summary
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:51:46.008Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/4.0/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
               },
               {
                  name: "DSA-5254",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2022/dsa-5254",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-22T23:04:35.819653",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               url: "https://docs.djangoproject.com/en/4.0/releases/security/",
            },
            {
               url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
            },
            {
               name: "DSA-5254",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2022/dsa-5254",
            },
            {
               url: "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a",
            },
            {
               url: "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468",
            },
            {
               url: "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-23833",
      datePublished: "2022-02-03T00:00:00",
      dateReserved: "2022-01-21T00:00:00",
      dateUpdated: "2024-08-03T03:51:46.008Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-24583
Vulnerability from cvelistv5
Published
2020-09-01 12:33
Modified
2024-08-04 15:19
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T15:19:08.390Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  name: "USN-4479-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4479-1/",
               },
               {
                  name: "FEDORA-2020-94407454d7",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
               },
               {
                  name: "FEDORA-2020-6941c0a65b",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
               },
               {
                  name: "FEDORA-2020-9c6b391162",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-20T14:42:08",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               name: "USN-4479-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4479-1/",
            },
            {
               name: "FEDORA-2020-94407454d7",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
            },
            {
               name: "FEDORA-2020-6941c0a65b",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
            },
            {
               name: "FEDORA-2020-9c6b391162",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-24583",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://docs.djangoproject.com/en/dev/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/dev/releases/security/",
                  },
                  {
                     name: "USN-4479-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4479-1/",
                  },
                  {
                     name: "FEDORA-2020-94407454d7",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
                  },
                  {
                     name: "FEDORA-2020-6941c0a65b",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
                  },
                  {
                     name: "FEDORA-2020-9c6b391162",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU",
                  },
                  {
                     name: "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM",
                  },
                  {
                     name: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
                     refsource: "MISC",
                     url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
                     refsource: "MISC",
                     url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200918-0004/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-24583",
      datePublished: "2020-09-01T12:33:13",
      dateReserved: "2020-08-21T00:00:00",
      dateUpdated: "2024-08-04T15:19:08.390Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-3281
Vulnerability from cvelistv5
Published
2021-02-02 06:16
Modified
2024-08-03 16:53
Severity ?
Summary
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T16:53:17.221Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.1/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/",
               },
               {
                  name: "FEDORA-2021-5329c680f7",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210226-0004/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by \"startapp --template\" and \"startproject --template\") allows directory traversal via an archive with absolute paths or relative paths with dot segments.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-02-26T08:06:39",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.1/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/",
            },
            {
               name: "FEDORA-2021-5329c680f7",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20210226-0004/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-3281",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by \"startapp --template\" and \"startproject --template\") allows directory traversal via an archive with absolute paths or relative paths with dot segments.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.1/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.1/releases/security/",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/",
                  },
                  {
                     name: "FEDORA-2021-5329c680f7",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20210226-0004/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20210226-0004/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-3281",
      datePublished: "2021-02-02T06:16:28",
      dateReserved: "2021-01-22T00:00:00",
      dateUpdated: "2024-08-03T16:53:17.221Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-14232
Vulnerability from cvelistv5
Published
2019-08-02 00:00
Modified
2024-08-05 00:12
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:djangoblog_project:djangoblog:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "djangoblog",
                  vendor: "djangoblog_project",
                  versions: [
                     {
                        lessThan: "2.2.4",
                        status: "affected",
                        version: "1.11.23",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2019-14232",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-02T18:04:48.307144Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-400",
                        description: "CWE-400 Uncontrolled Resource Consumption",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:12:01.500Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:12:42.892Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/dev/releases/security/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
               },
               {
                  name: "openSUSE-SU-2019:1839",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
               },
               {
                  name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Aug/15",
               },
               {
                  name: "DSA-4498",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2019/dsa-4498",
               },
               {
                  name: "openSUSE-SU-2019:1872",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
               },
               {
                  name: "FEDORA-2019-647f74ce51",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
               },
               {
                  name: "GLSA-202004-17",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202004-17",
               },
               {
                  name: "[oss-security] 20231004 Django: CVE-2023-43665: Denial-of-service possibility in django.utils.text.Truncator",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/10/04/6",
               },
               {
                  name: "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-01T17:09:49.299848",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://docs.djangoproject.com/en/dev/releases/security/",
            },
            {
               url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
            },
            {
               url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
            },
            {
               name: "openSUSE-SU-2019:1839",
               tags: [
                  "vendor-advisory",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
            },
            {
               name: "20190812 [SECURITY] [DSA 4498-1] python-django security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://seclists.org/bugtraq/2019/Aug/15",
            },
            {
               name: "DSA-4498",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.debian.org/security/2019/dsa-4498",
            },
            {
               name: "openSUSE-SU-2019:1872",
               tags: [
                  "vendor-advisory",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
            },
            {
               name: "FEDORA-2019-647f74ce51",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
            },
            {
               name: "GLSA-202004-17",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://security.gentoo.org/glsa/202004-17",
            },
            {
               name: "[oss-security] 20231004 Django: CVE-2023-43665: Denial-of-service possibility in django.utils.text.Truncator",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2023/10/04/6",
            },
            {
               name: "[oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-14232",
      datePublished: "2019-08-02T00:00:00",
      dateReserved: "2019-07-22T00:00:00",
      dateUpdated: "2024-08-05T00:12:42.892Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-7233
Vulnerability from cvelistv5
Published
2017-04-04 17:00
Modified
2024-08-05 15:56
Severity ?
Summary
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
References
http://www.securitytracker.com/id/1038177vdb-entry, x_refsource_SECTRACK
https://access.redhat.com/errata/RHSA-2017:1596vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/97406vdb-entry, x_refsource_BID
https://access.redhat.com/errata/RHSA-2017:3093vendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2017/dsa-3835vendor-advisory, x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2017:1445vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2017:1451vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2927vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2017:1470vendor-advisory, x_refsource_REDHAT
https://www.djangoproject.com/weblog/2017/apr/04/security-releases/x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2017:1462vendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:56:36.158Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1038177",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1038177",
               },
               {
                  name: "RHSA-2017:1596",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2017:1596",
               },
               {
                  name: "97406",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/97406",
               },
               {
                  name: "RHSA-2017:3093",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2017:3093",
               },
               {
                  name: "DSA-3835",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2017/dsa-3835",
               },
               {
                  name: "RHSA-2017:1445",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2017:1445",
               },
               {
                  name: "RHSA-2017:1451",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2017:1451",
               },
               {
                  name: "RHSA-2018:2927",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2927",
               },
               {
                  name: "RHSA-2017:1470",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2017:1470",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
               },
               {
                  name: "RHSA-2017:1462",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2017:1462",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-04-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-17T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1038177",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1038177",
            },
            {
               name: "RHSA-2017:1596",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2017:1596",
            },
            {
               name: "97406",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/97406",
            },
            {
               name: "RHSA-2017:3093",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2017:3093",
            },
            {
               name: "DSA-3835",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2017/dsa-3835",
            },
            {
               name: "RHSA-2017:1445",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2017:1445",
            },
            {
               name: "RHSA-2017:1451",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2017:1451",
            },
            {
               name: "RHSA-2018:2927",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:2927",
            },
            {
               name: "RHSA-2017:1470",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2017:1470",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
            },
            {
               name: "RHSA-2017:1462",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2017:1462",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2017-7233",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1038177",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1038177",
                  },
                  {
                     name: "RHSA-2017:1596",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2017:1596",
                  },
                  {
                     name: "97406",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/97406",
                  },
                  {
                     name: "RHSA-2017:3093",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2017:3093",
                  },
                  {
                     name: "DSA-3835",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2017/dsa-3835",
                  },
                  {
                     name: "RHSA-2017:1445",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2017:1445",
                  },
                  {
                     name: "RHSA-2017:1451",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2017:1451",
                  },
                  {
                     name: "RHSA-2018:2927",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:2927",
                  },
                  {
                     name: "RHSA-2017:1470",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2017:1470",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
                  },
                  {
                     name: "RHSA-2017:1462",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2017:1462",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2017-7233",
      datePublished: "2017-04-04T17:00:00",
      dateReserved: "2017-03-22T00:00:00",
      dateUpdated: "2024-08-05T15:56:36.158Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-33203
Vulnerability from cvelistv5
Published
2021-06-08 17:52
Modified
2024-08-03 23:42
Severity ?
Summary
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T23:42:20.290Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21forum/django-announce",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://docs.djangoproject.com/en/3.2/releases/security/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
               },
               {
                  name: "FEDORA-2022-e7fd530688",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-11T02:06:41",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://groups.google.com/forum/#%21forum/django-announce",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://docs.djangoproject.com/en/3.2/releases/security/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
            },
            {
               name: "FEDORA-2022-e7fd530688",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-33203",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!forum/django-announce",
                     refsource: "MISC",
                     url: "https://groups.google.com/forum/#!forum/django-announce",
                  },
                  {
                     name: "https://docs.djangoproject.com/en/3.2/releases/security/",
                     refsource: "MISC",
                     url: "https://docs.djangoproject.com/en/3.2/releases/security/",
                  },
                  {
                     name: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
                     refsource: "CONFIRM",
                     url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20210727-0004/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
                  },
                  {
                     name: "FEDORA-2022-e7fd530688",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-33203",
      datePublished: "2021-06-08T17:52:20",
      dateReserved: "2021-05-19T00:00:00",
      dateUpdated: "2024-08-03T23:42:20.290Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2019-08-09 13:15
Modified
2024-11-21 04:26
Severity ?
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Aug/15Mailing List, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190828-0002/
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4498Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/15Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190828-0002/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4498Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49BD116-09A6-454E-BB68-65FCDE06DF33",
                     versionEndExcluding: "1.11.23",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D05096B-F60E-4DB2-AE59-EED55F945AB0",
                     versionEndExcluding: "2.1.11",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B",
                     versionEndExcluding: "2.2.4",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                     matchCriteriaId: "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of \"OR 1=1\" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a 2.1.11 y versiones 2.2.x anteriores a 2.2.4. Debido a un error en la transformación de clave superficial, las búsquedas de clave e índice para django.contrib.postgres.fields.JSONField, y las búsquedas de clave para django.contrib.postgres.fields.HStoreField, estaban sujetas a una inyección SQL. Esto podría, por ejemplo, ser explotado mediante el uso de un \"OR 1 = 1\" diseñado en una clave o nombre de índice para devolver todos los registros, utilizando un diccionario cuidadosamente diseñado, con expansión de diccionario, como los **kwargs pasados a la función QuerySet.filter().",
      },
   ],
   id: "CVE-2019-14234",
   lastModified: "2024-11-21T04:26:15.537",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-08-09T13:15:11.777",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-08 18:15
Modified
2024-11-21 06:08
Summary
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD8BA629-0BE3-443F-A383-04CB1F2E22FC",
                     versionEndExcluding: "2.2.24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C9108D-FCDC-4B71-8F2A-328CC32C255D",
                     versionEndExcluding: "3.1.12",
                     versionStartIncluding: "3.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D3AB5A-FF13-4123-B759-A2E9F941F540",
                     versionEndExcluding: "3.2.4",
                     versionStartIncluding: "3.2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.",
      },
      {
         lang: "es",
         value: "Django versiones anteriores a 2.2.24, versiones 3.x anteriores a 3.1.12 y versiones 3.2.x anteriores a 3.2.4, presenta un potencial salto de directorio por medio de django.contrib.admindocs. Los miembros del personal podrían usar la visualización TemplateDetailView para comprobar la existencia de archivos arbitrarios. Adicionalmente, si (y sólo si) las plantillas admindocs por defecto han sido personalizadas por los desarrolladores de aplicaciones para mostrar también el contenido de los archivos, entonces no sólo se habría expuesto la existencia sino también el contenido de los archivos. En otras palabras, se presenta un salto de directorio fuera de los directorios root de las plantillas",
      },
   ],
   id: "CVE-2021-33203",
   lastModified: "2024-11-21T06:08:30.487",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-08T18:15:08.480",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-07-01 14:15
Modified
2024-11-21 04:23
Summary
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2019/07/01/3Mailing List, Patch, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/109018Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Jul/10Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190705-0002/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4043-1/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4476Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/jul/01/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/07/01/3Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/109018Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Jul/10Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190705-0002/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4043-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4476Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/jul/01/security-releases/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC20F94C-6807-48BE-A1BB-EADF99C75889",
                     versionEndExcluding: "1.11.22",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21F4A0E0-8305-45B7-9C3A-606E17312A59",
                     versionEndExcluding: "2.1.10",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "984DDB9B-4102-4A5F-A135-4ACF913BA03B",
                     versionEndExcluding: "2.2.3",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.",
      },
      {
         lang: "es",
         value: "Se ha descubierto un problema en Django en versiones 1.11 anteriores a la 1.11.22, 2.1, anteriores a la 2.1.10, y 2.2 anteriores 2.2.3. Una petición HTTP no se redirige a HTTPS cuando se usan las configuraciones SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT, y el proxy se conecta a Django a través de HTTPS. En otras palabras, django.http.HttpRequest.scheme tiene un comportamiento incorrecto cuando un cliente usa HTTP.",
      },
   ],
   id: "CVE-2019-12781",
   lastModified: "2024-11-21T04:23:33.900",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-07-01T14:15:10.847",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/07/01/3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.securityfocus.com/bid/109018",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Jul/10",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190705-0002/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4043-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4476",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/07/01/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.securityfocus.com/bid/109018",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/Is4kLY9ZcZQ",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Jul/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190705-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4043-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/jul/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-319",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-01 19:15
Modified
2024-11-21 07:47
Summary
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
References
cve@mitre.orghttps://docs.djangoproject.com/en/4.1/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/02/msg00000.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20230302-0007/
cve@mitre.orghttps://www.djangoproject.com/weblog/2023/feb/01/security-releases/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.1/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/02/msg00000.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230302-0007/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2023/feb/01/security-releases/Release Notes, Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA5D2BA-8195-4151-81BF-61B77617DB02",
                     versionEndExcluding: "3.2.17",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4722ED63-A5C3-483E-9C70-CDAF197486BE",
                     versionEndExcluding: "4.0.9",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E71A1487-1E70-4162-8DDF-697CA23C5A05",
                     versionEndExcluding: "4.1.6",
                     versionStartIncluding: "4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.",
      },
   ],
   id: "CVE-2023-23969",
   lastModified: "2024-11-21T07:47:10.833",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-02-01T19:15:08.763",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.1/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20230302-0007/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.1/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20230302-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:47
Summary
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7324BB5-64C7-45F6-ADEB-E0929B4B00B6",
                     versionEndExcluding: "2.2.27",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D15BB946-FCF5-43FC-99EF-EBB2513CA2FB",
                     versionEndExcluding: "3.2.12",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA09D497-21DD-410D-9692-A601B1EAA0B9",
                     versionEndExcluding: "4.0.2",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.",
      },
      {
         lang: "es",
         value: "La etiqueta de plantilla {% debug %} en Django versiones 2.2 anteriores a 2.2.27, 3.2 anteriores a 3.2.12 y 4.0 anteriores a 4.0.2, no codifica correctamente el contexto actual. Esto puede conllevar a un ataque de tipo XSS",
      },
   ],
   id: "CVE-2022-22818",
   lastModified: "2024-11-21T06:47:30.683",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-03T02:15:07.580",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-15 01:15
Modified
2024-11-21 07:48
Summary
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/02/14/1Mailing List, Release Notes, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/4.1/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/02/msg00023.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20230316-0006/
cve@mitre.orghttps://www.djangoproject.com/weblog/2023/feb/14/security-releases/Patch, Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/02/14/1Mailing List, Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.1/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/02/msg00023.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230316-0006/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2023/feb/14/security-releases/Patch, Release Notes, Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "73D9FA8C-F224-45CC-980F-F7ABD7AB9BA2",
                     versionEndExcluding: "3.2.18",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08D34DC1-EA58-44BB-BBC2-B6089E525D59",
                     versionEndExcluding: "4.0.10",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDF86D1D-0552-4E21-95D2-85D2AE484F9F",
                     versionEndExcluding: "4.1.7",
                     versionStartIncluding: "4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Multipart Request Parser de Django 3.2 anterior a 3.2.18, 4.0 anterior a 4.0.10 y 4.1 anterior a 4.1.7. Pasar ciertas entradas (por ejemplo, una cantidad excesiva de partes) a formularios de varias partes podría generar demasiados archivos abiertos o agotamiento de la memoria, y proporcionaba un vector potencial para un ataque de denegación de servicio.",
      },
   ],
   id: "CVE-2023-24580",
   lastModified: "2024-11-21T07:48:10.217",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-02-15T01:15:10.687",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/02/14/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.1/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20230316-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2023/02/14/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.1/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20230316-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-08-24 14:59
Modified
2024-11-21 02:34
Severity ?
Summary
The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1766.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1767.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1894.html
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3338
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/76440
cve@mitre.orghttp://www.securitytracker.com/id/1033318
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2720-1Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2015/aug/18/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1766.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1767.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1894.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3338
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/76440
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033318
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2720-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/aug/18/security-releases/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CE2864-1EF6-4197-9D1F-051497F1CC5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED485DA4-0614-4788-B278-5F1F43F5A579",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C3B4B46-383E-498C-8EFD-8C3FB1F494B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E1359DE-835F-4748-95F4-D2990DBF6A8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE466393-EE2B-44AD-8C69-D4C34A773FFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3C103B6-2FB6-4BF5-B88C-A68DEBABBBCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "32DDDBEB-6F2F-4BA9-876D-38D41BA29726",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "61680046-51CD-4217-AC1E-C11265205DB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DAD077F-A239-4021-890E-AD4D9D9A388D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2DCD8E1-EF0F-4878-8952-E0F729A524C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3CB49AF-2A89-4277-B2E9-67803A395A23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D36984-4C8E-4CDB-8D15-445705FCECF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad en las funciones (1) contrib.sessions.backends.base.SessionBase.flush y (2) cache_db.SessionStore.flush en Django 1.7.x en versiones anteriores a 1.7.10, 1.4.x en versiones anteriores a 1.4.22 y posiblemente en otras versiones, crea sesiones vacías en ciertas circunstancias, que permite a atacantes remotos causar una denegación de servicio (consumo de almacén de sesión) a través de vectores no especificados.",
      },
   ],
   id: "CVE-2015-5964",
   lastModified: "2024-11-21T02:34:13.863",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-08-24T14:59:09.837",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2015/dsa-3338",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/76440",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1033318",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2720-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2015/dsa-3338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/76440",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1033318",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2720-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96EC0AAD-1199-4CDB-B599-A7959A160CB6",
                     versionEndIncluding: "1.2.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "C40AD94B-AC89-4404-973F-5E60468D06EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A952FB-3A74-4A39-8870-1F37059C9D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*",
                     matchCriteriaId: "F75FE4BB-2C64-404F-9347-25289556BE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "AF1504F2-968F-4E1A-A143-BE494E658DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.",
      },
      {
         lang: "es",
         value: "El mecanismo de protección ante CSRF de Django hasta la versión 1.2.7 y 1.3.x hasta la 1.3.1 no maneja apropiadamente las configuraciones del servidor web que soportan cabeceras HTTP Host arbitrarias, lo que permite a atacantes remotos provocar peticiones falsificadas sin autenticar a través de vectores que involucran un registro DNS CNAME y una página web que contenga código JavaScript.",
      },
   ],
   id: "CVE-2011-4140",
   lastModified: "2024-11-21T01:31:55.587",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2011-10-19T10:55:04.643",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "cve@mitre.org",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-352",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-03-25 14:59
Modified
2024-11-21 02:27
Severity ?
Summary
The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.htmlThird Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-04/msg00001.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
cve@mitre.orghttp://ubuntu.com/usn/usn-2539-1Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3204Third Party Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2015:195Broken Link
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/73319
cve@mitre.orghttps://www.djangoproject.com/weblog/2015/mar/18/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-2539-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3204Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:195Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/73319
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/mar/18/security-releases/Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                     matchCriteriaId: "253C303A-E577-4488-93E6-68A8DD942C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "94432CC2-A802-43D2-A571-1C5BA64F735A",
                     versionEndIncluding: "1.4.19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFC18F77-77CB-45CB-869E-267DACD19601",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B3937A5-D537-4A9A-B7EF-0F7C441EE520",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B63ECA8-0AD0-4670-B026-6762DCC65D15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB39F768-9616-4C56-9613-55A5229DDCA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "9074F301-7595-464A-8DE5-41E78E5EE804",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "32DDDBEB-6F2F-4BA9-876D-38D41BA29726",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "61680046-51CD-4217-AC1E-C11265205DB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DAD077F-A239-4021-890E-AD4D9D9A388D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1C288F-326B-497B-B26C-D26E01262DDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A63F39-30BE-443F-AF10-6245587D3359",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \\x08javascript: URL.",
      },
      {
         lang: "es",
         value: "La función utils.http.is_safe_url en Django anterior a 1.4.20, 1.5.x, 1.6.x anterior a 1.6.11, 1.7.x anterior a 1.7.7, y 1.8.x anterior a 1.8c1 no valida correctamente las URLs, lo que permite a atacantes remotos realizar ataques de XSS a través de un caracter de control en una URL, tal y como fue demostrado por una URL \\x08javascript.",
      },
   ],
   id: "CVE-2015-2317",
   lastModified: "2024-11-21T02:27:12.140",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2015-03-25T14:59:04.377",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2539-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3204",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/73319",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2539-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3204",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/73319",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-04 17:59
Modified
2024-11-21 03:31
Summary
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
References
cve@mitre.orghttp://www.debian.org/security/2017/dsa-3835
cve@mitre.orghttp://www.securityfocus.com/bid/97406Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1038177
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:1445
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:1451
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:1462
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:1470
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:1596
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:3093
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2018:2927
cve@mitre.orghttps://www.djangoproject.com/weblog/2017/apr/04/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2017/dsa-3835
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/97406Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038177
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1445
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1451
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1462
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1470
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1596
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:3093
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:2927
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2017/apr/04/security-releases/Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:a1:*:*:*:*:*:*",
                     matchCriteriaId: "85ED1834-500C-4E37-BD51-E42DB28F3B67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:b1:*:*:*:*:*:*",
                     matchCriteriaId: "E6E3323E-6AC0-4703-A3A4-A429946B0839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:b2:*:*:*:*:*:*",
                     matchCriteriaId: "7AB300FB-2A7D-498E-891D-E75DCA9ED7A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:c1:*:*:*:*:*:*",
                     matchCriteriaId: "1AC1822A-A7FE-4F38-BD5A-74388A5405D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D36984-4C8E-4CDB-8D15-445705FCECF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B324AE6-ADD8-41B9-B250-A6577ACBB364",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6487058-6768-4AD3-BE27-A0B3D1ACFC08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CFF0538-B111-44A8-ADC2-87E280186257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3343FF8-53EC-459D-B31C-CD363D04FF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9B637E9-067A-4473-9B50-433CCC177982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "99A5BF6D-631B-4C8E-9868-579BD79100C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "280B9958-9163-4126-910A-2EF4B408DFCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A40373B-301E-4B81-8FA5-28D916142F59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "79BB3174-7859-4195-B7B3-BCAA280A6F80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "42EF41AF-B2FA-468A-B161-D9FE29CE53EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DF0100-F98E-4997-A8F7-DC07FA4A06D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECDC5647-8EA7-4595-88C2-541BC489ED2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB571E66-C1B2-4FFD-8265-FB381CF4ACE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "C49F25DA-CD52-49A9-B5BE-63FD399A9813",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:a1:*:*:*:*:*:*",
                     matchCriteriaId: "0B4797F9-82E9-4BA8-868D-C6F18BA01DE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:b1:*:*:*:*:*:*",
                     matchCriteriaId: "E885D945-FB55-47F4-AA6B-462AFBDAD750",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "48BD4296-E83B-4563-9A39-70C95EEAA337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "F63D8C0A-D93E-4A1F-A8F8-D22314771AD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A18691A7-E4D0-48A4-81A7-89846E991AF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C06EBD9-381E-4018-BFDC-E23EA18097B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D134048-B64F-45AE-B4A2-26E516CCF37B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "64A4030E-F51F-4944-BCE7-E27CD32EC7D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC1F046-DAF7-4734-9F80-A3C57857AF18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "61EE8536-0E8D-477A-B8EA-817CE21D516A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "483D0F44-15C8-43A2-B3AE-331F40DA1A80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD33E383-2772-4F79-A2C9-4F9EB8FBC8EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "77D82BAD-B2AE-49FB-AF71-393631D2B29C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2541CE-0462-46DF-BDD8-C19D6E45140B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:a1:*:*:*:*:*:*",
                     matchCriteriaId: "1763E8EB-F943-4A9A-8E19-E6BE9F847DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:b1:*:*:*:*:*:*",
                     matchCriteriaId: "48E20213-67BB-4A16-B961-502BA4E54A98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "3C71C2E3-C134-45B0-BDDC-FFE7612AB1EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE31960-7C68-42F3-B215-B30A87DB67CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D6C6214-7946-4025-84E6-59448CFE75B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "58182835-CB1F-4490-AE65-90601DBFD0D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "04AE04CD-E923-4630-9BAA-5A4D5A5D0055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2517FB1C-B732-432B-9F27-EE60F6556433",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.",
      },
      {
         lang: "es",
         value: "Django 1.10 en versiones anteriores a 1.10.7, 1.9 en versiones anteriores a 1.9.13, y 1.8 en versiones anteriores a 1.8.18 se basa en la entrada del usuario en algunos casos para redirigir al usuario a una URL de \"éxito\". La comprobación de seguridad de estos redireccionamientos (a saber, `` django.utils.http.is_safe_url()``) considera que algunas URL numéricas son \"seguras\" cuando no deberían serlo, también conocida como una vulnerabilidad de redirección abierta. Además, si un desarrollador confía en `` is_safe_url() `` para proporcionar destinos de redirección seguros y pone esa URL en un enlace, podría sufrir un ataque XSS.",
      },
   ],
   id: "CVE-2017-7233",
   lastModified: "2024-11-21T03:31:25.980",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-04T17:59:00.273",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97406",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1038177",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2017:1445",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2017:1451",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2017:1462",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2017:1470",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2017:1596",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2017:3093",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2018:2927",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97406",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1038177",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2017:1445",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2017:1451",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2017:1462",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2017:1470",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2017:1596",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2017:3093",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2018:2927",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-601",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-05-16 15:55
Modified
2024-11-21 02:04
Severity ?
Summary
Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "7118F616-25CA-4E34-AA13-4D14BB62419F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F61F047-129C-41A6-8A27-FFCBB8563E91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.",
      },
      {
         lang: "es",
         value: "Django 1.4 anterior a 1.4.13, 1.5 anterior a 1.5.8, 1.6 anterior a 1.6.5 y 1.7 anterior a 1.7b4 no incluye debidamente la cabecera (1) Vary: Cookie o (2) Cache-Control en respuestas, lo que permite a atacantes remotos obtener información sensible o envenenar la caché a través de una solicitud de ciertos navegadores.",
      },
   ],
   id: "CVE-2014-1418",
   lastModified: "2024-11-21T02:04:14.533",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-05-16T15:55:04.597",
   references: [
      {
         source: "security@ubuntu.com",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@ubuntu.com",
         url: "http://ubuntu.com/usn/usn-2212-1",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://ubuntu.com/usn/usn-2212-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
      },
   ],
   sourceIdentifier: "security@ubuntu.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-06 16:15
Modified
2024-11-21 06:06
Summary
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED7CB1DC-4D83-4D30-8778-D3DC95D636A8",
                     versionEndExcluding: "2.2.22",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F5F0697-2B95-41DA-BDAE-CAE64BFF11D2",
                     versionEndExcluding: "3.1.10",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDAA914-CAC5-4F6F-AAC7-B586115EA2EE",
                     versionEndExcluding: "3.2.2",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A6F7D1-9BD9-46A1-81FA-3FCE1B4CCFC5",
                     versionStartIncluding: "3.9.5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.",
      },
      {
         lang: "es",
         value: "En Django 2.2 versiones anteriores a 2.2.22, 3.1 versiones anteriores a 3.1.10 y 3.2 versiones anteriores a 3.2.2 (con Python 3.9.5+), URLValidator no prohíbe nuevas líneas y pestañas (a menos que sea usado el campo URLField form).&#xa0;Si una aplicación usa valores con nuevas líneas en una respuesta HTTP, puede ocurrir una inyección de encabezado.&#xa0;Django en sí no está afectado porque HttpResponse prohíbe las nuevas líneas en los encabezados HTTP",
      },
   ],
   id: "CVE-2021-32052",
   lastModified: "2024-11-21T06:06:46.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-05-06T16:15:07.520",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/06/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210611-0002/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/06/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210611-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 16:15
Modified
2024-10-30 17:35
Summary
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *
djangoproject django 5.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F4E9063-064F-4C6E-9985-7A049D38D299",
                     versionEndExcluding: "4.2.16",
                     versionStartIncluding: "4.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B3803EA-9D53-4E0B-A8E2-CB90D9677E75",
                     versionEndExcluding: "5.0.9",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A1AE023-D9C3-4D36-B17F-7F6F24E59EF2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 5.1 anterior a 5.1.1, 5.0 anterior a 5.0.9 y 4.2 anterior a 4.2.16. Los filtros de plantilla urlize() y urlizetrunc() están sujetos a un posible ataque de denegación de servicio mediante entradas muy grandes con una secuencia específica de caracteres.",
      },
   ],
   id: "CVE-2024-45230",
   lastModified: "2024-10-30T17:35:09.360",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T16:15:11.903",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-10-03 18:59
Modified
2024-11-21 02:57
Summary
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
References
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-2038.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-2039.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-2040.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-2041.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-2042.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-2043.html
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3678Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/93182Third Party Advisory
cve@mitre.orghttp://www.securitytracker.com/id/1036899Third Party Advisory
cve@mitre.orghttp://www.ubuntu.com/usn/USN-3089-1Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2016/sep/26/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-2038.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-2039.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-2040.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-2041.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-2042.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-2043.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3678Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/93182Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036899Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3089-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2016/sep/26/security-releases/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "66FE8806-7FCB-4CFD-9EAF-05F2ED9F6B9B",
                     versionEndIncluding: "1.8.14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4BDA562-AB2E-457C-8DA5-32AB90CB5E3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A18691A7-E4D0-48A4-81A7-89846E991AF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C06EBD9-381E-4018-BFDC-E23EA18097B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D134048-B64F-45AE-B4A2-26E516CCF37B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "64A4030E-F51F-4944-BCE7-E27CD32EC7D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC1F046-DAF7-4734-9F80-A3C57857AF18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "61EE8536-0E8D-477A-B8EA-817CE21D516A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.",
      },
      {
         lang: "es",
         value: "El código de análisis de cookie en Django en versiones anteriores a 1.8.15 y 1.9.x en versiones anteriores a 1.9.10, cuando se utiliza en un sitio con Google Analytics, permite a atacantes remotos eludir un mecanismo de protección CSRF destinado estableciendo cookies arbitrarias.",
      },
   ],
   id: "CVE-2016-7401",
   lastModified: "2024-11-21T02:57:55.553",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-10-03T18:59:13.137",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2038.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2039.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2040.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2041.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2042.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2043.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3678",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.securityfocus.com/bid/93182",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.securitytracker.com/id/1036899",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3089-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2038.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2039.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2040.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2041.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2042.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-2043.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3678",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.securityfocus.com/bid/93182",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.securitytracker.com/id/1036899",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3089-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-254",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-01 13:15
Modified
2024-11-21 05:15
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
References
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200918-0004/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4479-1/Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2020/sep/01/security-releases/Vendor Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2020/09/01/2Mailing List, Patch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200918-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4479-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2020/sep/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2020/09/01/2Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "419C0026-8399-4CEA-AC73-3BCBD26C2FE3",
                     versionEndExcluding: "2.2.16",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7353206B-6A09-492C-9B8B-67738124D913",
                     versionEndExcluding: "3.0.10",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A860912-086E-4556-8636-E50EFC30C3B5",
                     versionEndExcluding: "3.1.1",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 2.2 anteriores a 2.2.16, versiones 3.0 anteriores a 3.0.10 y versiones 3.1 anteriores a 3.1.1 (cuando es usado Python 3.7+).&#xa0;El modo FILE_UPLOAD_DIRECTORY_PERMISSIONS no fue aplicado a los directorios de nivel intermedio creados en el proceso de carga de archivos.&#xa0;Tampoco se aplicó a directorios estáticos recopilados de nivel intermedio cuando está usando el comando de administración collectstatic",
      },
   ],
   id: "CVE-2020-24583",
   lastModified: "2024-11-21T05:15:03.120",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-01T13:15:11.150",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4479-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4479-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-276",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-02-14 21:00
Modified
2024-11-21 01:24
Severity ?
Summary
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de salto de directorio en Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 en Windows, cuando está habilitado  permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres /(barra) en la llave de una cookie de sesión , relacionada con la repetición de sesiones.\r\n",
      },
   ],
   id: "CVE-2011-0698",
   lastModified: "2024-11-21T01:24:38.440",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-02-14T21:00:03.320",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/09/6",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43230",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/46296",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0372",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0439",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/09/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43230",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/46296",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0372",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0439",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-01 13:15
Modified
2024-11-21 05:15
Summary
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
References
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200918-0004/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4479-1/Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2020/sep/01/security-releases/Vendor Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2020/09/01/2Mailing List, Patch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200918-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4479-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2020/sep/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2020/09/01/2Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "419C0026-8399-4CEA-AC73-3BCBD26C2FE3",
                     versionEndExcluding: "2.2.16",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7353206B-6A09-492C-9B8B-67738124D913",
                     versionEndExcluding: "3.0.10",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A860912-086E-4556-8636-E50EFC30C3B5",
                     versionEndExcluding: "3.1.1",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 2.2 anteriores a 2.2.16, versiones 3.0 anteriores a 3.0.10 y versiones 3.1 anteriores a 3.1.1 (cuando es usado Python 3.7+).&#xa0;Los directorios de nivel intermedio de la caché del sistema de archivos tenían la umask estándar del sistema en lugar de 0o077",
      },
   ],
   id: "CVE-2020-24584",
   lastModified: "2024-11-21T05:15:03.370",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-01T13:15:11.197",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4479-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200918-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4479-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/sep/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2020/09/01/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-276",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-03 13:15
Modified
2024-11-21 08:09
Summary
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
References
cve@mitre.orghttps://docs.djangoproject.com/en/4.2/releases/security/Release Notes
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announcePermissions Required
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/07/msg00022.htmlMailing List
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5465Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2023/jul/03/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.2/releases/security/Release Notes
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announcePermissions Required
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/07/msg00022.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5465Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2023/jul/03/security-releases/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3100A051-B070-4C3E-B192-51CF3D1C4B46",
                     versionEndExcluding: "3.2.20",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BA4371C-EE73-4D0C-87B1-ECDD0B1E5387",
                     versionEndExcluding: "4.1.10",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A53AB7F4-CE96-459E-A2D7-BF331976C289",
                     versionEndExcluding: "4.2.3",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.",
      },
   ],
   id: "CVE-2023-36053",
   lastModified: "2024-11-21T08:09:14.967",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-07-03T13:15:09.737",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5465",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2023/dsa-5465",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1333",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-1333",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-03 14:15
Modified
2024-11-21 07:12
Summary
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2022/08/03/1Mailing List, Patch, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/4.0/releases/security/Not Applicable, Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/g/django-announce/c/8cz--gvaJr4Release Notes, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20220915-0008/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2022/dsa-5254Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2022/aug/03/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2022/08/03/1Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.0/releases/security/Not Applicable, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/g/django-announce/c/8cz--gvaJr4Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20220915-0008/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5254Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2022/aug/03/security-releases/Patch, Vendor Advisory
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *
debian debian_linux 11.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F43CB4C3-700F-479A-B1DC-5AF8C28F59FB",
                     versionEndExcluding: "3.2.15",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F207BC68-F4FA-4783-A43E-693C6857811F",
                     versionEndExcluding: "4.0.7",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.",
      },
      {
         lang: "es",
         value: "Se ha detectado un problema en la clase HTTP FileResponse en Django versiones 3.2 anteriores a 3.2.15 y 4.0 anteriores a 4.0.7. Una aplicación es vulnerable a un ataque de descarga de archivos reflejada (RFD) que establece el encabezado Content-Disposition de un FileResponse cuando el nombre del archivo es derivado de la entrada proporcionada por el usuario",
      },
   ],
   id: "CVE-2022-36359",
   lastModified: "2024-11-21T07:12:51.800",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-03T14:15:08.710",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/08/03/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/g/django-announce/c/8cz--gvaJr4",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220915-0008/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/08/03/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/g/django-announce/c/8cz--gvaJr4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220915-0008/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/aug/03/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-494",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-10-23 18:22
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C38224F-C41B-428C-89C2-603BBA95AD3C",
                     versionEndExcluding: "4.2.15",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3384B57C-DBF5-4E23-99E7-92B260D53E8E",
                     versionEndExcluding: "5.0.8",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. Los métodos QuerySet.values() y value_list() en modelos con JSONField están sujetos a inyección SQL en alias de columna a través de una clave de objeto JSON diseñada como un *arg pasado.",
      },
   ],
   id: "CVE-2024-42005",
   lastModified: "2024-10-23T18:22:48.937",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2024-08-07T15:15:56.220",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2010-09-14 19:00
Modified
2024-11-21 01:17
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.
Impacted products
Vendor Product Version
djangoproject django 1.2.1
djangoproject django 1.2.1
djangoproject django 1.2.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*",
                     matchCriteriaId: "F75FE4BB-2C64-404F-9347-25289556BE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Django 1.2.x, en versiones anteriores a la 1.2.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante una cookie csrfmiddlewaretoken (también conocida como csrf_token).",
      },
   ],
   id: "CVE-2010-3082",
   lastModified: "2024-11-21T01:17:59.737",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2010-09-14T19:00:02.953",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://marc.info/?l=oss-security&m=128403961700444&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2010/sep/08/security-release/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/43116",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1004-1",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=632239",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=oss-security&m=128403961700444&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2010/sep/08/security-release/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/43116",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1004-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=632239",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-08-07 20:48
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C38224F-C41B-428C-89C2-603BBA95AD3C",
                     versionEndExcluding: "4.2.15",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3384B57C-DBF5-4E23-99E7-92B260D53E8E",
                     versionEndExcluding: "5.0.8",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. Los filtros de plantilla urlize y urlizetrunc, y el widget AdminURLFieldWidget, están sujetos a un posible ataque de denegación de servicio a través de ciertas entradas con una gran cantidad de caracteres Unicode.",
      },
   ],
   id: "CVE-2024-41991",
   lastModified: "2024-08-07T20:48:22.403",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2024-08-07T15:15:56.160",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-130",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2009-10-13 10:30
Modified
2024-11-21 01:07
Severity ?
Summary
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457
cve@mitre.orghttp://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/
cve@mitre.orghttp://secunia.com/advisories/36948Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36968Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1905
cve@mitre.orghttp://www.djangoproject.com/weblog/2009/oct/09/security/Patch, Vendor Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/10/13/6
cve@mitre.orghttp://www.securityfocus.com/bid/36655Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/2871Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/53727
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36948Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36968Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1905
af854a3a-2127-422b-91ae-364da2661108http://www.djangoproject.com/weblog/2009/oct/09/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/10/13/6
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36655Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2871Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/53727
Impacted products
Vendor Product Version
djangoproject django 1.0
djangoproject django 1.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de complejidad algorítmica en la forma library en Django v1.0 anterior v1.0.4 y v1.1 anterior v1.1.1 permite a atacantes remotos causar una denegación de servicio (consumo CPU( a través de (1) EmailField (dirección email) o (2) URLField (URL)que provoca una gran cantidad de backtracking (vuelta a atrás) en una expresión regular.",
      },
   ],
   id: "CVE-2009-3695",
   lastModified: "2024-11-21T01:07:58.727",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2009-10-13T10:30:00.767",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457",
      },
      {
         source: "cve@mitre.org",
         url: "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/36948",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/36968",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2009/dsa-1905",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2009/oct/09/security/",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2009/10/13/6",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/36655",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2009/2871",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/36948",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/36968",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2009/dsa-1905",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2009/oct/09/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2009/10/13/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/36655",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2009/2871",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/53727",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2024-11-21 01:47
Severity ?
Summary
The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "33D378F8-CFDC-4882-A838-406ABA7AD8CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "132795AE-92DD-42CB-A59E-5F7136F93B46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5BE262-260E-4250-8F68-7392FD68970E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18B54E2-447B-4B38-9E88-6833F67EB24C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "C1E1C4B1-2A0A-459C-8348-AA7DA5C5B781",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:beta:*:*:*:*:*:*",
                     matchCriteriaId: "F979543B-913B-46E9-8A40-BE2707D297F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "7118F616-25CA-4E34-AA13-4D14BB62419F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4174F4F-149E-41A6-BBCC-D01114C05F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.",
      },
      {
         lang: "es",
         value: "La interfaz administrativa para Django v1.3.x antes de v1.3.6, v1.4.x antes de v1.4.4, y v1.5 antes de la release candidate v2 no comprueba los permisos para la vista del historial, que permite a usuarios administradores autenticados obtener información del historial.",
      },
   ],
   evaluatorImpact: "Per http://www.ubuntu.com/usn/usn-1757-1/\r\n\"A security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n    Ubuntu 12.10\r\n    Ubuntu 12.04 LTS\r\n    Ubuntu 11.10\r\n    Ubuntu 10.04 LTS\"",
   id: "CVE-2013-0305",
   lastModified: "2024-11-21T01:47:16.100",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-05-02T14:55:05.257",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://ubuntu.com/usn/usn-1757-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2013/dsa-2634",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://ubuntu.com/usn/usn-1757-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2013/dsa-2634",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B91DE6A-D759-4B2C-982B-AF036B43798D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA690BD-2FBA-425B-AC6F-046081E21183",
                     versionEndIncluding: "1.4.13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFC18F77-77CB-45CB-869E-267DACD19601",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.",
      },
      {
         lang: "es",
         value: "La configuración por defecto para el sistema del manejo de la subida de ficheros en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3 utiliza un proceso de la generación de nombres de ficheros secuencial cuando se sube un fichero con un nombre en conflicto, lo que permite a atacantes remotos causar una denegación de servicio (consumo de CPU) mediante la descarga de múltiples ficheros con el mismo nombre.",
      },
   ],
   id: "CVE-2014-0481",
   lastModified: "2024-11-21T02:02:13.517",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-08-26T14:55:05.250",
   references: [
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "security@debian.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-03-12 14:59
Modified
2024-11-21 02:27
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django 1.8



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ECFF958-872F-4EC8-B5B2-9C0988E55D42",
                     versionEndIncluding: "1.7.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de XSS en la función de contenidos en admin/helpers.py en Django anterior a 1.7.6 y 1.8 anterior a 1.8b2 permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a través de un atributo de modelo en ModelAdmin.readonly_fields, tal y como fue demostrado por un @property.",
      },
   ],
   id: "CVE-2015-2241",
   lastModified: "2024-11-21T02:27:03.467",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2015-03-12T14:59:05.870",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/73095",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://code.djangoproject.com/ticket/24461",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/73095",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://code.djangoproject.com/ticket/24461",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-02-11 13:29
Modified
2024-11-21 04:47
Summary
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
References
cve@mitre.orghttp://www.securityfocus.com/bid/106964Third Party Advisory, VDB Entry
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Jul/10
cve@mitre.orghttps://usn.ubuntu.com/3890-1/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4476
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/feb/11/security-releases/Patch, Vendor Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2019/02/11/1Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/106964Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Jul/10
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3890-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4476
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/feb/11/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2019/02/11/1Mailing List, Patch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E500ADB-2D05-499C-9A7E-0FDA027189DD",
                     versionEndExcluding: "1.11.19",
                     versionStartIncluding: "1.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C54AC983-C1E1-4CD1-8343-50744FE71181",
                     versionEndExcluding: "2.0.11",
                     versionStartIncluding: "2.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C200A0C-1105-4747-B2C1-A624D80D747D",
                     versionEndExcluding: "2.1.6",
                     versionStartIncluding: "2.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                     matchCriteriaId: "D100F7CE-FC64-4CC6-852A-6136D72DA419",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.",
      },
      {
         lang: "es",
         value: "Django, en versiones 1.11.x anteriores a la 1.11.19, versiones 2.0.x anteriores a la 2.0.11 y versiones 2.1.x anteriores a la 2.1.6, permite el consumo incontrolado de memoria mediante un valor malicioso proporcionado por el atacante a la función django.utils.numberformat.format().",
      },
   ],
   id: "CVE-2019-6975",
   lastModified: "2024-11-21T04:47:20.663",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-02-11T13:29:00.270",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106964",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2019/Jul/10",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3890-1/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2019/dsa-4476",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2019/02/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106964",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/WTwEAprR0IQ",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2019/Jul/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3890-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2019/dsa-4476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/feb/11/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2019/02/11/1",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-10 20:00
Modified
2024-11-21 01:21
Severity ?
Summary
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
References
secalert@redhat.comhttp://code.djangoproject.com/changeset/15032Patch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html
secalert@redhat.comhttp://secunia.com/advisories/42715Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/42827
secalert@redhat.comhttp://secunia.com/advisories/42913
secalert@redhat.comhttp://www.djangoproject.com/weblog/2010/dec/22/security/Patch, Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/12/23/4Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/01/03/5Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/45563
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1040-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0048
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0098
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=665373Patch
af854a3a-2127-422b-91ae-364da2661108http://code.djangoproject.com/changeset/15032Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42715Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42827
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42913
af854a3a-2127-422b-91ae-364da2661108http://www.djangoproject.com/weblog/2010/dec/22/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/12/23/4Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/01/03/5Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/45563
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1040-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0048
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0098
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=665373Patch



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3216CF3F-DC3B-41E5-AAEF-6E6939E4F219",
                     versionEndIncluding: "1.1.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "C40AD94B-AC89-4404-973F-5E60468D06EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A952FB-3A74-4A39-8870-1F37059C9D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "AF1504F2-968F-4E1A-A143-BE494E658DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.",
      },
      {
         lang: "es",
         value: "La funcionalidad de restablecimiento de contraseña en django.contrib.auth en Django antes de v1.1.3, v1.2.x antes de v1.2.4, y v1.3.x antes de v1.3 beta 1 no valida la longitud de una cadena que representa una marca de tiempo en base36, que permite a atacantes remotos ausar una denegación de servicio (consumo de recursos) a través de una URL que especifica un gran número entero en base36.",
      },
   ],
   id: "CVE-2010-4535",
   lastModified: "2024-11-21T01:21:09.703",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-10T20:00:16.937",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://code.djangoproject.com/changeset/15032",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/42715",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/42827",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/42913",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/45563",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1040-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0048",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0098",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://code.djangoproject.com/changeset/15032",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/42715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/42827",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/42913",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/45563",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1040-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0048",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0098",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-07-02 10:15
Modified
2024-11-21 06:11
Severity ?
Summary
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8638ED91-8E83-4894-B0BE-0C5344391CBB",
                     versionEndExcluding: "3.1.13",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8569B3E5-3A3A-4EDB-B057-9AF6E66677D0",
                     versionEndExcluding: "3.2.5",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.",
      },
      {
         lang: "es",
         value: "Django versiones 3.1.x anteriores a 3.1.13 y  versiones 3.2.x anteriores a 3.2.5, permiten la inyección SQL de la función QuerySet.order_by si el parámetro order_by es una entrada no fiable de un cliente de una aplicación web",
      },
   ],
   id: "CVE-2021-35042",
   lastModified: "2024-11-21T06:11:43.993",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-07-02T10:15:07.653",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210805-0008/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2021/07/02/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210805-0008/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2021/07/02/2",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-03 05:15
Modified
2024-11-21 08:20
Summary
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "787A1B2B-92D9-4AB3-92EF-9ACFC816941C",
                     versionEndExcluding: "3.2.21",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "19DCBA7A-59D0-48D3-B914-9A1FD766BDD9",
                     versionEndExcluding: "4.1.11",
                     versionStartIncluding: "4.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9423A928-5354-4042-92C4-FE3B0B2CE4D9",
                     versionEndExcluding: "4.2.5",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.",
      },
      {
         lang: "es",
         value: "En Django 3.2 anterior a 3.2.21, 4.1 anterior a 4.1.11 y 4.2 anterior a 4.2.5, django.utils.encoding.uri_to_iri() está sujeto a un posible ataque DoS (denegación de servicio) a través de ciertas entradas con un número muy grande de caracteres Unicode.",
      },
   ],
   id: "CVE-2023-41164",
   lastModified: "2024-11-21T08:20:42.437",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-03T05:15:29.447",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20231214-0002/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20231214-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-08-24 14:59
Modified
2024-11-21 02:34
Severity ?
Summary
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1766.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1767.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1894.html
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3338
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/76428
cve@mitre.orghttp://www.securitytracker.com/id/1033318
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2720-1Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2015:1876
cve@mitre.orghttps://www.djangoproject.com/weblog/2015/aug/18/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1766.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1767.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1894.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3338
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/76428
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033318
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2720-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2015:1876
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/aug/18/security-releases/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CE2864-1EF6-4197-9D1F-051497F1CC5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED485DA4-0614-4788-B278-5F1F43F5A579",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C3B4B46-383E-498C-8EFD-8C3FB1F494B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E1359DE-835F-4748-95F4-D2990DBF6A8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE466393-EE2B-44AD-8C69-D4C34A773FFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3C103B6-2FB6-4BF5-B88C-A68DEBABBBCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "32DDDBEB-6F2F-4BA9-876D-38D41BA29726",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "61680046-51CD-4217-AC1E-C11265205DB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DAD077F-A239-4021-890E-AD4D9D9A388D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2DCD8E1-EF0F-4878-8952-E0F729A524C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3CB49AF-2A89-4277-B2E9-67803A395A23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D36984-4C8E-4CDB-8D15-445705FCECF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad en contrib.sessions.middleware.SessionMiddleware en Django 1.8.x en versiones anteriores a 1.8.4, 1.7.x en versiones anteriores a 1.7.10, 1.4.x en versiones anteriores a 1.4.22 y posiblemente otras versiones, permite a atacantes remotos causar una denegación de servicio (consumo de almacén de sesión o eliminación de registro de sesión) a través de un gran número de peticiones a contrib.auth.views.logout, lo que desencadena la creación de un registro de sesión vacío.",
      },
   ],
   id: "CVE-2015-5963",
   lastModified: "2024-11-21T02:34:13.687",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-08-24T14:59:08.773",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2015/dsa-3338",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/76428",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1033318",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2720-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2015:1876",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00026.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1766.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1767.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1894.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2015/dsa-3338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/76428",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1033318",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2720-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2015:1876",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/aug/18/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-01-09 23:29
Modified
2024-11-21 04:42
Summary
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
References
cve@mitre.orghttp://www.securityfocus.com/bid/106453Third Party Advisory, VDB Entry
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/01/msg00005.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
cve@mitre.orghttps://usn.ubuntu.com/3851-1/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4363Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/jan/04/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/106453Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/01/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3851-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4363Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/jan/04/security-releases/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C84D66BB-CC5E-459D-96DB-E5DC39B2D78C",
                     versionEndExcluding: "1.11.18",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42F39FE-26F2-4165-8C46-12070A4E86D6",
                     versionEndExcluding: "2.0.10",
                     versionStartIncluding: "2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D957B9E2-3156-4B32-B62F-235EDEDD6782",
                     versionEndExcluding: "2.1.5",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.",
      },
      {
         lang: "es",
         value: "En Django, en versiones 1.11.x anteriores a la 1.11.18, versiones 2.0.x anteriores a la 2.0.10 y 2.1.x anteriores a la 2.1.5, existe una neutralización incorrecta de elementos especiales en las salidas empleadas por un componente de bajada en django.views.defaults.page_not_found(), lo que conduce a la suplantación de contenido (en una página de error 404) si un usuario fracasa a la hora de reconocer que una URL manipulada tiene contenido malicioso.",
      },
   ],
   id: "CVE-2019-3498",
   lastModified: "2024-11-21T04:42:08.733",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-01-09T23:29:05.387",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106453",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3851-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4363",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106453",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3851-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2019/dsa-4363",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-74",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-09-16 19:14
Modified
2024-11-21 01:55
Severity ?
Summary
Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de recorrido de directorios en Django 1.4.x anterior a 1.4.7, 1.5.x anterior a 1.5.3, y 1.6.x anterior a 1.6 beta 3 permite a atacantes remotos leer ficheros arbitrarios a través de una ruta de fichero en la opción  ALLOWED_INCLUDE_ROOTS en una etiqueta de plantilla ssi",
      },
   ],
   id: "CVE-2013-4315",
   lastModified: "2024-11-21T01:55:20.330",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-09-16T19:14:39.303",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54772",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54828",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2013/dsa-2755",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54772",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54828",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2013/dsa-2755",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-04-23 15:55
Modified
2024-11-21 02:02
Severity ?
Summary
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D817D6FC-F568-46C9-B49E-7CD7457756E4",
                     versionEndIncluding: "1.4.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EDEF8A4-F929-49AB-A8CD-E40CCCDB638C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5463AB51-6088-473A-BB54-BB78ACFC6DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "14EC0E5B-2CEC-450A-B5A2-16BE4147DB55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "EDD55056-2537-4E69-9D9D-2697501C0EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "7118F616-25CA-4E34-AA13-4D14BB62419F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F61F047-129C-41A6-8A27-FFCBB8563E91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a \"dotted Python path.\"",
      },
      {
         lang: "es",
         value: "La función django.core.urlresolvers.reverse en Django anterior a  1.4.11, 1.5.x anterior a 1.5.6, 1.6.x anterior a 1.6.3 y 1.7.x anterior a 1.7 beta 2 permite a atacantes remotos importar y ejecutar módulos Python arbitrarios mediante el aprovechamiento de una visualización que construye URLs utilizando entradas de usuarios y una \"ruta Python con puntos.\"",
      },
   ],
   id: "CVE-2014-0472",
   lastModified: "2024-11-21T02:02:12.393",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-04-23T15:55:02.923",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
      },
      {
         source: "security@debian.org",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "security@debian.org",
         url: "http://www.ubuntu.com/usn/USN-2169-1",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2169-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2015-0026.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
secalert@redhat.comhttp://secunia.com/advisories/62285
secalert@redhat.comhttp://secunia.com/advisories/62309
secalert@redhat.comhttp://secunia.com/advisories/62718
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:036
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:109
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2469-1Patch, Vendor Advisory
secalert@redhat.comhttps://www.djangoproject.com/weblog/2015/jan/13/security/Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2015-0026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62285
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62309
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62718
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2469-1Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/jan/13/security/Exploit, Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E636F6CA-1979-43DA-A12F-23EC009B4A65",
                     versionEndIncluding: "1.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5463AB51-6088-473A-BB54-BB78ACFC6DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "72653EB4-CE19-42FC-9C99-5CB391DABE7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.",
      },
      {
         lang: "es",
         value: "Django anterior a 1.4.18, 1.6.x anterior a 1.6.10, y 1.7.x anterior a 1.7.3 permite a atacantes remotos falsificar cabeceras WSGI mediante el uso de un caracter _ (guión bajo) en lugar de un caracter - (guión) en una cabecera HTTP, tal y como fue demostrado por una cabecera X-Auth_User.",
      },
   ],
   id: "CVE-2015-0219",
   lastModified: "2024-11-21T02:22:34.657",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-01-16T16:59:18.657",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62718",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2469-1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62718",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2469-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-17",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-02 14:15
Modified
2024-11-21 04:34
Summary
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2019/12/02/1Mailing List, Patch, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20191217-0003/Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/dec/02/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/12/02/1Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20191217-0003/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/dec/02/security-releases/Patch, Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F28B6AFD-209E-4F73-8186-8D271551DA14",
                     versionEndExcluding: "2.1.15",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8C7C4A3-6D86-43F3-9E07-B05760C6BC18",
                     versionEndExcluding: "2.2.8",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)",
      },
      {
         lang: "es",
         value: "Django versiones 2.1 anteriores a 2.1.15 y versiones 2.2 anteriores a 2.2.8, permite una edición de modelos  involuntaria. Un administrador de modelo de Django que despliega modelos relacionados en línea, donde el usuario tiene permisos de solo lectura para un modelo principal pero permisos de edición para el modelo en línea, sería presentado con una IU de edición, que permite peticiones POST, para actualizar el modelo en línea. No fue posible editar directamente el modelo principal de solo lectura, pero el método save() del modelo principal fue llamado, activando posibles efectos secundarios y causando que los manejadores de señales previos y posteriores al guardado sean invocados. (Para resolver esto, el administrador de Django es ajustado para requerir permisos de edición en el modelo principal para que los modelos en línea sean editables).",
      },
   ],
   id: "CVE-2019-19118",
   lastModified: "2024-11-21T04:34:13.920",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-02T14:15:10.880",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/02/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20191217-0003/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/02/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/GjGqDvtNmWQ",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20191217-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-276",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-03 14:15
Modified
2024-11-21 05:01
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
References
cve@mitre.orghttps://docs.djangoproject.com/en/3.0/releases/security/Release Notes, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200611-0002/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4381-1/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4381-2/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2020/dsa-4705Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2020/jun/03/security-releases/Release Notes, Vendor Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/3.0/releases/security/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200611-0002/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4381-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4381-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4705Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2020/jun/03/security-releases/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93BB1B8B-778D-4625-BCA4-245FA7CB7EB3",
                     versionEndExcluding: "2.2.13",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8843BC60-8D53-469D-A194-BB5259C317E8",
                     versionEndExcluding: "3.0.7",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:sra_plugin:-:*:*:*:*:linux:*:*",
                     matchCriteriaId: "96EEC4C4-E4A9-4CB3-8801-2DD26C00AC8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 2.2  anteriores a 2.2.13 y  versiones 3.0 anteriores a 3.0.7. En casos donde un backend memcached no lleva a cabo una comprobación de la clave, pasa claves de caché maliciosas que podría resultar en una colisión de claves y una potencial filtración de datos.",
      },
   ],
   id: "CVE-2020-13596",
   lastModified: "2024-11-21T05:01:34.947",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-03T14:15:12.627",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4705",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4705",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-08-05 15:59
Modified
2024-11-21 02:55
Summary
Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
References
cve@mitre.orghttp://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.htmlVDB Entry
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-1594.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-1595.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-1596.html
cve@mitre.orghttp://seclists.org/fulldisclosure/2016/Jul/53Mailing List, Patch
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3622Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/538947/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/92058
cve@mitre.orghttp://www.securitytracker.com/id/1036338VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-3039-1Third Party Advisory
cve@mitre.orghttp://www.vulnerability-lab.com/get_content.php?id=1869Patch, Third Party Advisory
cve@mitre.orghttps://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158Patch
cve@mitre.orghttps://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479dPatch
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/
cve@mitre.orghttps://www.djangoproject.com/weblog/2016/jul/18/security-releases/Patch, Vendor Advisory
cve@mitre.orghttps://www.exploit-db.com/exploits/40129/
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.htmlVDB Entry
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1594.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1595.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1596.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2016/Jul/53Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3622Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/538947/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92058
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036338VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3039-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vulnerability-lab.com/get_content.php?id=1869Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479dPatch
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2016/jul/18/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/40129/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E370D6-9EA2-48B6-AA81-B98D982679FA",
                     versionEndIncluding: "1.8.13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "832F9FA9-5FC8-4DB6-AD39-C3D1C21C4568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A18691A7-E4D0-48A4-81A7-89846E991AF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C06EBD9-381E-4018-BFDC-E23EA18097B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D134048-B64F-45AE-B4A2-26E516CCF37B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "64A4030E-F51F-4944-BCE7-E27CD32EC7D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "36ECEDD6-A60B-4DE1-881B-899641489BAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "035DDCD9-7679-4106-BCDA-89D67195D5E8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de XSS en la función dismissChangeRelatedObjectPopup en contrib/admin/static/admin/js/admin/RelatedObjectLookups.js en Django en versiones anteriores a 1.8.14, 1.9.x en versiones anteriores a 1.9.8 y 1.10.x en versiones anteriores a 1.10rc1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectors relacionados con el uso no seguro de Element.innerHTML.",
      },
   ],
   id: "CVE-2016-6186",
   lastModified: "2024-11-21T02:55:37.857",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-08-05T15:59:09.503",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-1594.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-1595.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-1596.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://seclists.org/fulldisclosure/2016/Jul/53",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3622",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/538947/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/92058",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1036338",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3039-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.vulnerability-lab.com/get_content.php?id=1869",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.exploit-db.com/exploits/40129/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-1594.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-1595.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-1596.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://seclists.org/fulldisclosure/2016/Jul/53",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3622",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/538947/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/92058",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1036338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3039-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.vulnerability-lab.com/get_content.php?id=1869",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMLLFAUT4J4IP4P2KI4NOVWRMHA22WUJ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHHPN6MISX5I6UTXQHYLPTLEEUE6WDXW/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/jul/18/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.exploit-db.com/exploits/40129/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-04-23 15:55
Modified
2024-11-21 02:02
Severity ?
Summary
The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5463AB51-6088-473A-BB54-BB78ACFC6DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "14EC0E5B-2CEC-450A-B5A2-16BE4147DB55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "EDD55056-2537-4E69-9D9D-2697501C0EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D817D6FC-F568-46C9-B49E-7CD7457756E4",
                     versionEndIncluding: "1.4.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EDEF8A4-F929-49AB-A8CD-E40CCCDB638C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "7118F616-25CA-4E34-AA13-4D14BB62419F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F61F047-129C-41A6-8A27-FFCBB8563E91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.",
      },
      {
         lang: "es",
         value: "La plataforma de caché en Django anterior a 1.4.11, 1.5.x anterior a 1.5.6, 1.6.x anterior a 1.6.3 y 1.7.x anterior a 1.7 beta 2 reutiliza un token de CSRF en caché para todos los usuarios anónimos, lo que permite a atacantes remotos evadir protecciones de CSRF mediante la lectura del cookie de CSRF para usuarios anónimos.",
      },
   ],
   id: "CVE-2014-0473",
   lastModified: "2024-11-21T02:02:12.523",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-04-23T15:55:03.127",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
      },
      {
         source: "security@debian.org",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "security@debian.org",
         url: "http://www.ubuntu.com/usn/USN-2169-1",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2169-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2024-11-21 01:47
Severity ?
Summary
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "33D378F8-CFDC-4882-A838-406ABA7AD8CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "132795AE-92DD-42CB-A59E-5F7136F93B46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5BE262-260E-4250-8F68-7392FD68970E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18B54E2-447B-4B38-9E88-6833F67EB24C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "C1E1C4B1-2A0A-459C-8348-AA7DA5C5B781",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:beta:*:*:*:*:*:*",
                     matchCriteriaId: "F979543B-913B-46E9-8A40-BE2707D297F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "7118F616-25CA-4E34-AA13-4D14BB62419F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4174F4F-149E-41A6-BBCC-D01114C05F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad sin especificar en el formulario \"library\" en Django v1.3.x antes de v1.3.6, v1.4.x antes de v1.4.4, v1.5 antes de release candidate v2 permite a atacantes remotos evitar las restricciones de los recursos y causar una denegación de servicios (consumo de memoria) o disparar errores del servidor a través de un parámetro max_num modificado.",
      },
   ],
   id: "CVE-2013-0306",
   lastModified: "2024-11-21T01:47:16.217",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-05-02T14:55:05.277",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://ubuntu.com/usn/usn-1757-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2013/dsa-2634",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2013-0670.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://ubuntu.com/usn/usn-1757-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2013/dsa-2634",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/feb/19/security/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-189",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-12-09 20:59
Modified
2024-11-21 03:00
Summary
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
References
cve@mitre.orghttp://www.debian.org/security/2017/dsa-3835
cve@mitre.orghttp://www.securityfocus.com/bid/94068Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1037159Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-3115-1Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/
cve@mitre.orghttps://www.djangoproject.com/weblog/2016/nov/01/security-releases/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2017/dsa-3835
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94068Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037159Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3115-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2016/nov/01/security-releases/Release Notes, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
                     matchCriteriaId: "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
                     matchCriteriaId: "772E9557-A371-4664-AE2D-4135AAEB89AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AFB20FA-CB00-4729-AB3A-816454C6D096",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BCCB794-1F30-4FC2-A63A-BCE7539BE5DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D36984-4C8E-4CDB-8D15-445705FCECF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B324AE6-ADD8-41B9-B250-A6577ACBB364",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6487058-6768-4AD3-BE27-A0B3D1ACFC08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CFF0538-B111-44A8-ADC2-87E280186257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3343FF8-53EC-459D-B31C-CD363D04FF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9B637E9-067A-4473-9B50-433CCC177982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "99A5BF6D-631B-4C8E-9868-579BD79100C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "280B9958-9163-4126-910A-2EF4B408DFCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A40373B-301E-4B81-8FA5-28D916142F59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "79BB3174-7859-4195-B7B3-BCAA280A6F80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "42EF41AF-B2FA-468A-B161-D9FE29CE53EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DF0100-F98E-4997-A8F7-DC07FA4A06D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECDC5647-8EA7-4595-88C2-541BC489ED2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE21DA5F-C086-4E98-A5DD-2B96731B56D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE31960-7C68-42F3-B215-B30A87DB67CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A18691A7-E4D0-48A4-81A7-89846E991AF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C06EBD9-381E-4018-BFDC-E23EA18097B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D134048-B64F-45AE-B4A2-26E516CCF37B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "64A4030E-F51F-4944-BCE7-E27CD32EC7D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC1F046-DAF7-4734-9F80-A3C57857AF18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "61EE8536-0E8D-477A-B8EA-817CE21D516A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "483D0F44-15C8-43A2-B3AE-331F40DA1A80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.",
      },
      {
         lang: "es",
         value: "Django en versiones anteriores a 1.8.x en versiones anteriores a 1.8.16, 1.9.x en versiones anteriores a 1.9.11 y 1.10.x en versiones anteriores a 1.10.3 cuando settings.DEBUG es True, permiten a atacantes remotos llevar a cabo ataques de revinculación DNS aprovechando el fallo para validar la cabecera del Host HTTP contra settings.ALLOWED_HOSTS.",
      },
   ],
   id: "CVE-2016-9014",
   lastModified: "2024-11-21T03:00:26.480",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-12-09T20:59:06.970",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94068",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1037159",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3115-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94068",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1037159",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3115-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-03 12:15
Modified
2024-11-21 05:37
Severity ?
Summary
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2020/02/03/1Mailing List, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/3.0/releases/security/Vendor Advisory
cve@mitre.orghttps://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136Patch, Third Party Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
cve@mitre.orghttps://seclists.org/bugtraq/2020/Feb/30
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200221-0006/
cve@mitre.orghttps://usn.ubuntu.com/4264-1/
cve@mitre.orghttps://www.debian.org/security/2020/dsa-4629
cve@mitre.orghttps://www.djangoproject.com/weblog/2020/feb/03/security-releases/Vendor Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2020/02/03/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2020/02/03/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/3.0/releases/security/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2020/Feb/30
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200221-0006/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4264-1/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4629
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2020/feb/03/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2020/02/03/1Mailing List, Third Party Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "00FE8079-CAF7-494D-BC2A-0B964A883EA6",
                     versionEndExcluding: "1.11.28",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4771CEA7-2ECE-4620-98E0-D5F1AA91889C",
                     versionEndExcluding: "2.2.10",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC272D38-BBBC-4440-A120-C2D60CC42A12",
                     versionEndExcluding: "3.0.3",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.",
      },
      {
         lang: "es",
         value: "Django versiones 1.11 anteriores a 1.11.28, versiones 2.2 anteriores a 2.2.10 y versiones 3.0 anteriores a 3.0.3, permite una Inyección SQL si se usan datos no confiables como un delimitador de StringAgg (por ejemplo, en aplicaciones Django que ofrecen descargas de datos como una serie de filas con un delimitador de columna especificado por el usuario). Al pasar un delimitador apropiadamente diseñado a una instancia contrib.postgres.aggregates.StringAgg, fue posible romper el escape e inyectar SQL malicioso.",
      },
   ],
   id: "CVE-2020-7471",
   lastModified: "2024-11-21T05:37:12.667",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-03T12:15:26.993",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2020/02/03/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2020/Feb/30",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200221-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/4264-1/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2020/dsa-4629",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2020/02/03/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2020/02/03/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2020/Feb/30",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200221-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/4264-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2020/dsa-4629",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2020/02/03/1",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-12 05:15
Modified
2024-11-21 06:57
Severity ?
Summary
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2022/04/11/1Mailing List, Patch, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/4.0/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2022/04/msg00013.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20220609-0002/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2022/dsa-5254Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2022/apr/11/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2022/04/11/1Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.0/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/04/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20220609-0002/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5254Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2022/apr/11/security-releases/Patch, Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A545BDF6-D358-44FB-8FF7-5D0166DC6B9B",
                     versionEndExcluding: "2.2.28",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ED1BF93-9E2C-457C-9596-F946FE223BAD",
                     versionEndExcluding: "3.2.13",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "36239F45-F5DF-4014-A2D0-F691D749C4CF",
                     versionEndExcluding: "4.0.4",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.",
      },
      {
         lang: "es",
         value: "Se ha detectado un problema en Django versiones 2.2 anteriores a 2.2.28, 3.2 anteriores a 3.2.13 y 4.0 anteriores a 4.0.4. Los métodos QuerySet.annotate(), aggregate() y extra() están sujetos a inyección SQL en los alias de columna por medio de un diccionario diseñado (con expansión de diccionario) como los **kwargs pasados",
      },
   ],
   id: "CVE-2022-28346",
   lastModified: "2024-11-21T06:57:11.007",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-12T05:15:06.927",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220609-0002/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220609-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96EC0AAD-1199-4CDB-B599-A7959A160CB6",
                     versionEndIncluding: "1.2.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "C40AD94B-AC89-4404-973F-5E60468D06EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A952FB-3A74-4A39-8870-1F37059C9D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*",
                     matchCriteriaId: "F75FE4BB-2C64-404F-9347-25289556BE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "AF1504F2-968F-4E1A-A143-BE494E658DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.",
      },
      {
         lang: "es",
         value: "La funcionalidad verify_exists de la implementación de URLField en Django en versiones anteriores a 1.2.7 y 1.3.x anteriores a 1.3.1 se basa en librerías Python que tratan de acceder a URLs arbitrarias sin un temporizador, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de todos los recursos) a través de una URL asociada con (1) una respuesta lenta, (2) una conexión TCP completa sin datos enviados o (3) una gran cantidad de datos de aplicación. Un problema relacionado con CVE-2011-1521.",
      },
   ],
   id: "CVE-2011-4137",
   lastModified: "2024-11-21T01:31:55.160",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-10-19T10:55:04.207",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "cve@mitre.org",
         url: "http://openwall.com/lists/oss-security/2011/09/15/5",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "cve@mitre.org",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2011/09/15/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96EC0AAD-1199-4CDB-B599-A7959A160CB6",
                     versionEndIncluding: "1.2.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "C40AD94B-AC89-4404-973F-5E60468D06EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A952FB-3A74-4A39-8870-1F37059C9D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*",
                     matchCriteriaId: "F75FE4BB-2C64-404F-9347-25289556BE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "AF1504F2-968F-4E1A-A143-BE494E658DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.",
      },
      {
         lang: "es",
         value: "Django v1.2.7 y v1.3.x anterior a v1.3.1 usa la cabecera de una petición HTTP host para la construcción de una dirección URL completa, en determinadas circunstancias, lo que permite a atacantes remotos para realizar ataques de envenenamiento de caché a través de una solicitud manipulada.",
      },
   ],
   id: "CVE-2011-4139",
   lastModified: "2024-11-21T01:31:55.443",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-10-19T10:55:04.580",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "cve@mitre.org",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-05 00:15
Modified
2024-11-21 06:31
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E20BDA6F-5744-4B52-B995-529E3A14EF69",
                     versionEndExcluding: "2.2.26",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E0CB9E7-6BFE-4732-872F-1DE2BFCA9223",
                     versionEndExcluding: "3.2.11",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAF6F5EA-00FA-4871-A06F-0F6F7DF1D06D",
                     versionEndExcluding: "4.0.1",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.",
      },
      {
         lang: "es",
         value: "Se ha detectado un problema en Django versiones 2.2 anteriores a 2.2.26, 3.2 anteriores a 3.2.11 y 4.0 anteriores a 4.0.1. UserAttributeSimilarityValidator incurría en una sobrecarga significativa al evaluar una contraseña enviada que era artificialmente grande en relación con los valores de comparación. En una situación en la que el acceso al registro de usuarios no estaba restringido, esto proporcionaba un vector potencial para un ataque de denegación de servicio.",
      },
   ],
   id: "CVE-2021-45115",
   lastModified: "2024-11-21T06:31:59.330",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-05T00:15:07.907",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2015-0026.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
secalert@redhat.comhttp://secunia.com/advisories/62285
secalert@redhat.comhttp://secunia.com/advisories/62309
secalert@redhat.comhttp://secunia.com/advisories/62718
secalert@redhat.comhttp://ubuntu.com/usn/usn-2469-1
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:036
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:109
secalert@redhat.comhttps://www.djangoproject.com/weblog/2015/jan/13/security/Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2015-0026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62285
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62309
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62718
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-2469-1
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/jan/13/security/Exploit, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*",
                     matchCriteriaId: "823E02CA-A145-46C2-BC4C-16DECB060B19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*",
                     matchCriteriaId: "E685F933-7C10-49B6-9F4B-89478AF51761",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A63F39-30BE-443F-AF10-6245587D3359",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E636F6CA-1979-43DA-A12F-23EC009B4A65",
                     versionEndIncluding: "1.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5463AB51-6088-473A-BB54-BB78ACFC6DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "72653EB4-CE19-42FC-9C99-5CB391DABE7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \"\\njavascript:\" URL.",
      },
      {
         lang: "es",
         value: "La función django.util.http.is_safe_url en Django anterior a 1.4.18, 1.6.x anterior a 1.6.10, y 1.7.x anterior a 1.7.3 no maneja correctamente los espacios en blanco líder, lo que permite a atacantes remotos realizar ataques de XSS a través de una URL manipulada, relacionado con redirigir URLs, tal y como fue demostrado por una URL '\\njavascript:'.",
      },
   ],
   id: "CVE-2015-0220",
   lastModified: "2024-11-21T02:22:34.803",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2015-01-16T16:59:19.563",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62718",
      },
      {
         source: "secalert@redhat.com",
         url: "http://ubuntu.com/usn/usn-2469-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62718",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://ubuntu.com/usn/usn-2469-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-08-02 15:15
Modified
2024-11-21 04:26
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Aug/15
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190828-0002/
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4498
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/15
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190828-0002/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4498
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49BD116-09A6-454E-BB68-65FCDE06DF33",
                     versionEndExcluding: "1.11.23",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D05096B-F60E-4DB2-AE59-EED55F945AB0",
                     versionEndExcluding: "2.1.11",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B",
                     versionEndExcluding: "2.2.4",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a  2.1.11 y versiones  2.2.x anteriores a 2.2.4. Si pasaron ciertas entradas, django.utils.encoding.uri_to_iri podría conllevar a un uso de la memoria significativo debido a una recursión cuando se codifican por resonancia las secuencias de octetos UTF-8 inválidas.",
      },
   ],
   id: "CVE-2019-14235",
   lastModified: "2024-11-21T04:26:15.690",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-08-02T15:15:12.023",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-674",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-09 20:29
Modified
2024-11-21 04:12
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96EB9D8B-0C33-4380-ACAB-D6E1C5962A34",
                     versionEndExcluding: "1.8.19",
                     versionStartIncluding: "1.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74E078B-62BB-4152-A18D-56CC11C0CF79",
                     versionEndExcluding: "1.11.11",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA9B61A1-0ED0-412E-B8A4-DE09598CC2A9",
                     versionEndExcluding: "2.0.3",
                     versionStartIncluding: "2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.",
      },
      {
         lang: "es",
         value: "Se ha descubierto un problema en Django, en versiones 2.0 anteriores a la 2.0.3; versiones 1.11 anteriores a la 1.11.11 y versiones 1.8 anteriores a la 1.8.19. Si los métodos de django.utils.text.Truncator chars() y words() se pasaban al argumento html=True, eran extremadamente lentos a la hora de evaluar ciertas entradas debido a una vulnerabilidad catastrófica de búsqueda hacia atrás en una expresión regular. Los métodos chars() y words() se emplean para implementar las plantillas de filtro truncatechars_html y truncatewords_html que, por lo tanto, eran vulnerables.",
      },
   ],
   id: "CVE-2018-7537",
   lastModified: "2024-11-21T04:12:19.227",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-09T20:29:00.660",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/103357",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2927",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0265",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3591-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/103357",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2927",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0265",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3591-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-185",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-12 05:15
Modified
2024-11-21 06:57
Severity ?
Summary
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2022/04/11/1Mailing List, Patch, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/4.0/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
cve@mitre.orghttps://www.debian.org/security/2022/dsa-5254Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2022/apr/11/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2022/04/11/1Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.0/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5254Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2022/apr/11/security-releases/Patch, Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A545BDF6-D358-44FB-8FF7-5D0166DC6B9B",
                     versionEndExcluding: "2.2.28",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ED1BF93-9E2C-457C-9596-F946FE223BAD",
                     versionEndExcluding: "3.2.13",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "36239F45-F5DF-4014-A2D0-F691D749C4CF",
                     versionEndExcluding: "4.0.4",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.",
      },
      {
         lang: "es",
         value: "Se ha detectado un problema de inyección SQL en la función QuerySet.explain() en Django versiones 2.2 anteriores a 2.2.28, 3.2 anteriores a 3.2.13 y 4.0 anteriores a 4.0.4. Esto ocurre al pasar un diccionario diseñado (con expansión de diccionario) como el argumento **options, y colocar una carga útil de inyección en un nombre de opción",
      },
   ],
   id: "CVE-2022-28347",
   lastModified: "2024-11-21T06:57:11.167",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-12T05:15:07.357",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/04/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/apr/11/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-16 06:15
Modified
2024-11-21 07:23
Summary
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.
References
cve@mitre.orghttps://docs.djangoproject.com/en/4.0/releases/security/Release Notes, Vendor Advisory
cve@mitre.orghttps://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924Patch, Third Party Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20221124-0001/Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2022/oct/04/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.0/releases/security/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20221124-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2022/oct/04/security-releases/Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AA2CC40-5E6E-4DB2-BBA2-45AB9465C433",
                     versionEndExcluding: "3.2.16",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0870A9C-4C3E-47C4-B10D-7F11649B3496",
                     versionEndExcluding: "4.0.8",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9860080C-1E84-45C0-A27F-EA4C57901563",
                     versionEndExcluding: "4.1.2",
                     versionStartIncluding: "4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.",
      },
      {
         lang: "es",
         value: "En Django versiones 3.2 anteriores a 3.2.16, 4.0 anteriores a 4.0.8, y 4.1 anteriores a 4.1.2, las URLs internacionalizadas estaban sujetas a un potencial ataque de denegación de servicio por medio del parámetro locale, que es tratado como una expresión regular",
      },
   ],
   id: "CVE-2022-41323",
   lastModified: "2024-11-21T07:23:02.917",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-16T06:15:09.650",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221124-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221124-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/oct/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-03-05 15:15
Modified
2024-11-21 05:40
Summary
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
References
cve@mitre.orghttps://docs.djangoproject.com/en/3.0/releases/security/Patch, Release Notes, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2022/05/msg00035.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200327-0004/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4296-1/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2020/dsa-4705Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2020/mar/04/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/3.0/releases/security/Patch, Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/05/msg00035.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200327-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4296-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4705Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2020/mar/04/security-releases/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E0FB31D-8247-46E5-B66D-E2D94C38C5D2",
                     versionEndExcluding: "1.11.29",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ABDBEB7-8FD6-488D-A715-FBE3908A777B",
                     versionEndExcluding: "2.2.11",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A24A04E9-31B2-4A5F-B5CE-1043D7977CCC",
                     versionEndExcluding: "3.0.4",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.",
      },
      {
         lang: "es",
         value: "Django versiones 1.11 anteriores a 1.11.29, versiones 2.2 anteriores a 2.2.11 y versiones 3.0 anteriores a 3.0.4, permite una Inyección SQL si datos no confiables son usados como un parámetro tolerance en funciones GIS y agregados en Oracle. Al pasar una tolerancia diseñada adecuadamente hacia las funciones GIS y agregarlas en Oracle, esto hizo posible romper el escape e inyectar SQL malicioso.",
      },
   ],
   id: "CVE-2020-9402",
   lastModified: "2024-11-21T05:40:33.953",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-03-05T15:15:12.410",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200327-0004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4296-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4705",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/fLUh_pOaKrY",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200327-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4296-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4705",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/mar/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-04-23 15:55
Modified
2024-11-21 02:02
Severity ?
Summary
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to "MySQL typecasting."



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "7118F616-25CA-4E34-AA13-4D14BB62419F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F61F047-129C-41A6-8A27-FFCBB8563E91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5463AB51-6088-473A-BB54-BB78ACFC6DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D817D6FC-F568-46C9-B49E-7CD7457756E4",
                     versionEndIncluding: "1.4.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EDEF8A4-F929-49AB-A8CD-E40CCCDB638C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "14EC0E5B-2CEC-450A-B5A2-16BE4147DB55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "EDD55056-2537-4E69-9D9D-2697501C0EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to \"MySQL typecasting.\"",
      },
      {
         lang: "es",
         value: "Las clases de campo de modelo (1) FilePathField, (2) GenericIPAddressField y (3) IPAddressField en Django anterior a 1.4.11, 1.5.x anterior a 1.5.6, 1.6.x anterior a1.6.3 y 1.7.x anterior a 1.7 beta 2 no realizan debidamente conversión de tipo, lo que permite a atacantes remotos tener impacto y vectores no especificados, relacionado con \"MySQL typecasting.\"",
      },
   ],
   id: "CVE-2014-0474",
   lastModified: "2024-11-21T02:02:12.650",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-04-23T15:55:03.237",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
      },
      {
         source: "security@debian.org",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "security@debian.org",
         url: "http://www.ubuntu.com/usn/USN-2169-1",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0456.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-0457.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2169-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/apr/21/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-05 00:15
Modified
2024-11-21 06:31
Summary
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E20BDA6F-5744-4B52-B995-529E3A14EF69",
                     versionEndExcluding: "2.2.26",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E0CB9E7-6BFE-4732-872F-1DE2BFCA9223",
                     versionEndExcluding: "3.2.11",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAF6F5EA-00FA-4871-A06F-0F6F7DF1D06D",
                     versionEndExcluding: "4.0.1",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.",
      },
      {
         lang: "es",
         value: "Se ha detectado un problema en Django versiones 2.2 anteriores a 2.2.26, 3.2 anteriores a 3.2.11 y 4.0 anteriores a 4.0.1. Debido al aprovechamiento de la lógica de resolución de variables del lenguaje de plantillas de Django, el filtro de plantillas dictsort era potencialmente vulnerable a una divulgación de información, o a una llamada de método no intencionada, si le es pasada una clave apropiadamente diseñada.",
      },
   ],
   id: "CVE-2021-45116",
   lastModified: "2024-11-21T06:31:59.500",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-05T00:15:07.953",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-07-31 17:55
Modified
2024-11-21 01:40
Severity ?
Summary
The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "225CA836-30A5-45C2-8AF2-F11D95170303",
                     versionEndIncluding: "1.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "E670BDE4-85E8-472F-B639-CB4CA53070A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "A6508CE5-0556-4889-9380-B6B06B79F515",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "1EEC80B3-36F1-48C7-A4C0-2144613E7C81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "D827F8B8-60D5-443C-B8B6-AAFE7122DB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "CE5C74F9-41EB-4D29-BB68-A2C6F5E6FF52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "F1694141-3247-46A3-9539-117016A100F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "CE66E695-67CC-418E-930B-F002CFDDA3E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "573ACC2E-1FAA-4609-8372-8C1A94C136A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "D7B67974-4584-411B-90BB-2D7BF06A8F42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "89E29453-349B-4A50-8C8A-36550AFB6771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*",
                     matchCriteriaId: "476CDAAC-84F9-42F8-BABC-121AD9674B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "19959A8A-7FF9-4318-803D-5CD9F866F795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "9696406B-76A8-40C8-BD92-0A7ACBB53354",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "33D378F8-CFDC-4882-A838-406ABA7AD8CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.",
      },
      {
         lang: "es",
         value: "Las clases (1) django.http.HttpResponseRedirect y (2) django.http.HttpResponsePermanentRedirect en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 no validan el esquema de un destino dredireccionado, lo que podría permitir a atacantes remotos conducir un ataque de secuencias de comandos en sitios cruzados (XSS) a través de un dato: URL.",
      },
   ],
   id: "CVE-2012-3442",
   lastModified: "2024-11-21T01:40:53.147",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2012-07-31T17:55:01.607",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2012/dsa-2529",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1560-1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2012/dsa-2529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1560-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-12-07 20:59
Modified
2024-11-21 02:38
Severity ?
Summary
The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0129.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0156.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0157.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0158.html
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3404
cve@mitre.orghttp://www.securityfocus.com/bid/77750
cve@mitre.orghttp://www.securitytracker.com/id/1034237
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2816-1
cve@mitre.orghttps://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4
cve@mitre.orghttps://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0129.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0156.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0157.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0158.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3404
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/77750
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034237
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2816-1
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDD6D743-BCFB-49E9-A287-8E36E6E619D6",
                     versionEndIncluding: "1.7.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D36984-4C8E-4CDB-8D15-445705FCECF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B324AE6-ADD8-41B9-B250-A6577ACBB364",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6487058-6768-4AD3-BE27-A0B3D1ACFC08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CFF0538-B111-44A8-ADC2-87E280186257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "832F9FA9-5FC8-4DB6-AD39-C3D1C21C4568",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.",
      },
      {
         lang: "es",
         value: "La función get_format en utils/formats.py en Django en versiones anteriores a 1.7.x en versiones anteriores a 1.7.11, 1.8.x en versiones anteriores a 1.8.7 y 1.9.x en versiones anteriores a 1.9rc2 puede permitir a atacantes remotos obtener secretos sensibles de aplicaciones a través de una clave de ajustes en lugar de un ajuste de formato de fecha/hora, según lo demostrado por SECRET_KEY.",
      },
   ],
   id: "CVE-2015-8213",
   lastModified: "2024-11-21T02:38:05.860",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-12-07T20:59:17.613",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0129.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0156.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0157.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0158.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2015/dsa-3404",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/77750",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1034237",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2816-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0129.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0156.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0157.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0158.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2015/dsa-3404",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/77750",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1034237",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2816-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96EC0AAD-1199-4CDB-B599-A7959A160CB6",
                     versionEndIncluding: "1.2.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "C40AD94B-AC89-4404-973F-5E60468D06EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A952FB-3A74-4A39-8870-1F37059C9D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*",
                     matchCriteriaId: "F75FE4BB-2C64-404F-9347-25289556BE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "AF1504F2-968F-4E1A-A143-BE494E658DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.",
      },
      {
         lang: "es",
         value: "La funcionalidad verify_exists de la implementación URLField en Django antes de su versión v1.2.7 y en v1.3.x antes de v1.3.1 originalmente comprueba la validez  de una URL a través de una petición HEAD, pero luego usa una petición GET de la URL en el caso de un redireccionamiento. Esto podría permitir a atacantes remotos para provocar peticiones GET aleatorias con una dirección IP de origen no deseados a través de una cabecera Location especificamente modificada.",
      },
   ],
   id: "CVE-2011-4138",
   lastModified: "2024-11-21T01:31:55.303",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-10-19T10:55:04.457",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "cve@mitre.org",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-07 02:15
Modified
2025-01-29 16:15
Summary
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "11799E5A-8045-48F2-BFBF-C377FD718F39",
                     versionEndExcluding: "3.2.19",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEC3B71C-022D-443A-AF8B-F3C13268C669",
                     versionEndExcluding: "4.1.9",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:4.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "6047ED22-7DD3-419E-B906-B120096CD8D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:4.2:b1:*:*:*:*:*:*",
                     matchCriteriaId: "47CC8B88-335C-4E6A-8AC9-DC6D5297607A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:4.2:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "23FA889E-19AF-4AE9-AF47-00561632B438",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's \"Uploading multiple files\" documentation suggested otherwise.",
      },
   ],
   id: "CVE-2023-31047",
   lastModified: "2025-01-29T16:15:42.863",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-07T02:15:08.917",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20230609-0008/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/may/03/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20230609-0008/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/may/03/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-06-03 17:29
Modified
2024-11-21 04:22
Summary
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2019/06/03/2Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/108559
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/1.11.21/Vendor Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/2.1.9/Vendor Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/2.2.2/Vendor Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/06/msg00001.html
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/07/msg00001.html
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Jul/10
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://usn.ubuntu.com/4043-1/
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4476
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/jun/03/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/06/03/2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/108559
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/1.11.21/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/2.1.9/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/2.2.2/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Jul/10
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4043-1/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4476
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/jun/03/security-releases/Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B14F0D9-4ECC-4A82-9486-76A9FD17494F",
                     versionEndExcluding: "1.11.21",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B7CE172-68F7-48FD-9158-FE1B1CA4C296",
                     versionEndExcluding: "2.1.9",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE916E62-8D25-4406-B096-C3224048E909",
                     versionEndExcluding: "2.2.2",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 1.11 antes de 1.11.21, 2.1 anterior de la versión 2.1.9 y 2.2 anterior de la versión  2.2.2. El valor de la URL actual en la que se puede hacer clic, mostrado por el AdminURLFieldWidget, muestra el valor proporcionado sin validarlo como una URL segura. Por lo tanto, un valor no validado almacenado en la base de datos, o un valor proporcionado como una carga útil del parámetro de consulta de URL, podría resultar en un enlace de JavaScript que se puede hacer clic.",
      },
   ],
   id: "CVE-2019-12308",
   lastModified: "2024-11-21T04:22:35.753",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-06-03T17:29:01.213",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/06/03/2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/108559",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/1.11.21/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/2.1.9/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/2.2.2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2019/Jul/10",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/4043-1/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2019/dsa-4476",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/06/03/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/108559",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/1.11.21/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/2.1.9/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/2.2.2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/GEbHU7YoVz8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.debian.org/debian-lts-announce/2019/06/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.debian.org/debian-lts-announce/2019/07/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USYRARSYB7PE3S2ZQO7PZNWMH7RPGL5G/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2019/Jul/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/4043-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2019/dsa-4476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/jun/03/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-10 20:00
Modified
2024-11-21 01:21
Severity ?
Summary
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.htmlExploit
secalert@redhat.comhttp://code.djangoproject.com/changeset/15031Patch
secalert@redhat.comhttp://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/Exploit
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html
secalert@redhat.comhttp://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/Exploit
secalert@redhat.comhttp://secunia.com/advisories/42715Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/42827
secalert@redhat.comhttp://secunia.com/advisories/42913
secalert@redhat.comhttp://www.djangoproject.com/weblog/2010/dec/22/security/Patch, Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/12/23/4Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/01/03/5Patch
secalert@redhat.comhttp://www.securityfocus.com/archive/1/515446
secalert@redhat.comhttp://www.securityfocus.com/bid/45562
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1040-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0048
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0098
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=665373Patch
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://code.djangoproject.com/changeset/15031Patch
af854a3a-2127-422b-91ae-364da2661108http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html
af854a3a-2127-422b-91ae-364da2661108http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/Exploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42715Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42827
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42913
af854a3a-2127-422b-91ae-364da2661108http://www.djangoproject.com/weblog/2010/dec/22/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/12/23/4Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/01/03/5Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/515446
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/45562
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1040-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0048
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0098
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=665373Patch



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3216CF3F-DC3B-41E5-AAEF-6E6939E4F219",
                     versionEndIncluding: "1.1.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "C40AD94B-AC89-4404-973F-5E60468D06EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A952FB-3A74-4A39-8870-1F37059C9D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "AF1504F2-968F-4E1A-A143-BE494E658DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.",
      },
      {
         lang: "es",
         value: "El interfaz de administración de django.contrib.admin de Django en versiones anteriores a 1.1.3, 1.2.x anteriores a 1.2.4, y 1.3.x anteriores a 1.3 beta 1 no restringen apropiadamente el uso de la cadena de consulta para realizar filtrado de objetos. Lo que permite a usuarios autenticados remotos obtener información confidencial a través de peticiones que contengan expresiones regulares, como se ha demostrado con el parámetro created_by__password__regex.",
      },
   ],
   id: "CVE-2010-4534",
   lastModified: "2024-11-21T01:21:09.587",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-10T20:00:16.877",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://code.djangoproject.com/changeset/15031",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/42715",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/42827",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/42913",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/515446",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/45562",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1040-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0048",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0098",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://code.djangoproject.com/changeset/15031",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/42715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/42827",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/42913",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2010/dec/22/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/12/23/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2011/01/03/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/515446",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/45562",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1040-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0048",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0098",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=665373",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-02-14 21:00
Modified
2024-11-21 01:24
Severity ?
Summary
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/02/09/6Patch
secalert@redhat.comhttp://secunia.com/advisories/43230
secalert@redhat.comhttp://secunia.com/advisories/43297
secalert@redhat.comhttp://secunia.com/advisories/43382
secalert@redhat.comhttp://secunia.com/advisories/43426
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2163
secalert@redhat.comhttp://www.djangoproject.com/weblog/2011/feb/08/security/Patch, Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:031
secalert@redhat.comhttp://www.securityfocus.com/bid/46296
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1066-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0372
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0388
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0429
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0439
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0441
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=676357Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/02/09/6Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43230
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43297
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43382
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43426
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2163
af854a3a-2127-422b-91ae-364da2661108http://www.djangoproject.com/weblog/2011/feb/08/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:031
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46296
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1066-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0372
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0388
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0429
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0439
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0441
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=676357Patch



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a \"combination of browser plugins and redirects,\" a related issue to CVE-2011-0447.",
      },
      {
         lang: "es",
         value: "Django v1.1.x antes de v1.1.4 y v1.2.x antes de v1.2.5 no valida correctamente las solicitudes HTTP que contienen una cabecera X-Requested-With , que facilita a los atacantes remotos para llevar a cabo ataques de vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) , permite a atacantes remotos secuestrar la autenticación de los administradores mediante peticiones AJAX manipuladas que aprovechan una \"combinación de complementos del navegador y redirecciones, esta vulnerabilidad esta relacionada con CVE-2011-0447.",
      },
   ],
   id: "CVE-2011-0696",
   lastModified: "2024-11-21T01:24:38.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2011-02-14T21:00:03.210",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/09/6",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43230",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43297",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43382",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43426",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2011/dsa-2163",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/46296",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1066-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0372",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0388",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0429",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0439",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0441",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=676357",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/09/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43230",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43297",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43382",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43426",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/46296",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1066-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0372",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0388",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0429",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0439",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0441",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=676357",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-352",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFC18F77-77CB-45CB-869E-267DACD19601",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA690BD-2FBA-425B-AC6F-046081E21183",
                     versionEndIncluding: "1.4.13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password URI.",
      },
      {
         lang: "es",
         value: "La interfaz administrativa (contrib.admin) en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3 no comprueba si un campo representa una relación entre modelos, lo que permite a usuarios remotos autenticados obtener información sensible a través de un parámetro to_field en una acción popup en una página de formularios de cambio de administración, como fue demostrado por una URI /admin/auth/user/?pop=1&t=password.",
      },
   ],
   id: "CVE-2014-0483",
   lastModified: "2024-11-21T02:02:13.800",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-08-26T14:55:05.347",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "security@debian.org",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-07-31 17:55
Modified
2024-11-21 01:40
Severity ?
Summary
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "225CA836-30A5-45C2-8AF2-F11D95170303",
                     versionEndIncluding: "1.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "E670BDE4-85E8-472F-B639-CB4CA53070A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "A6508CE5-0556-4889-9380-B6B06B79F515",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "1EEC80B3-36F1-48C7-A4C0-2144613E7C81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "D827F8B8-60D5-443C-B8B6-AAFE7122DB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "CE5C74F9-41EB-4D29-BB68-A2C6F5E6FF52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "F1694141-3247-46A3-9539-117016A100F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "CE66E695-67CC-418E-930B-F002CFDDA3E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "573ACC2E-1FAA-4609-8372-8C1A94C136A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "D7B67974-4584-411B-90BB-2D7BF06A8F42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "89E29453-349B-4A50-8C8A-36550AFB6771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*",
                     matchCriteriaId: "476CDAAC-84F9-42F8-BABC-121AD9674B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "19959A8A-7FF9-4318-803D-5CD9F866F795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "9696406B-76A8-40C8-BD92-0A7ACBB53354",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "33D378F8-CFDC-4882-A838-406ABA7AD8CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.",
      },
      {
         lang: "es",
         value: "La clase django.forms.ImageField en el sistema de formularios en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 descomprime completamente los datos de la imagen durante la validación de la misma, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) mediante la subida de una imagen.",
      },
   ],
   id: "CVE-2012-3443",
   lastModified: "2024-11-21T01:40:53.263",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-07-31T17:55:04.577",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2012/dsa-2529",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1560-1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2012/dsa-2529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1560-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-05 15:15
Modified
2024-11-21 06:05
Summary
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2021/05/04/3Mailing List, Patch, Third Party Advisory
cve@mitre.orghttps://docs.djangoproject.com/en/3.2/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d
cve@mitre.orghttps://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48
cve@mitre.orghttps://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/05/msg00005.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20210618-0001/Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2021/may/04/security-releases/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/05/04/3Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/3.2/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20210618-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2021/may/04/security-releases/Release Notes, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13443AFD-6FA0-487D-8C84-068829D44AD0",
                     versionEndExcluding: "2.2.21",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D90DC9B2-CDD1-41E6-8745-29CDFE00CE1A",
                     versionEndExcluding: "3.1.9",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B014E657-30B7-4174-BAF4-F7C92435900A",
                     versionEndExcluding: "3.2.1",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.",
      },
      {
         lang: "es",
         value: "En Django versiones 2.2 anteriores a 2.2.21, versiones 3.1 anteriores a 3.1.9 y versiones 3.2 anteriores a 3.2.1, MultiPartParser, UploadedFile y FieldFile, permitían un salto de directorio por medio de archivos cargados con nombres de archivo cuidadosamente diseñados",
      },
   ],
   id: "CVE-2021-31542",
   lastModified: "2024-11-21T06:05:52.810",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-05-05T15:15:08.483",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/04/3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210618-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/may/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/04/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210618-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/may/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-12-09 20:59
Modified
2024-11-21 03:00
Severity ?
Summary
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
References
cve@mitre.orghttp://www.debian.org/security/2017/dsa-3835
cve@mitre.orghttp://www.securityfocus.com/bid/94069Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1037159Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-3115-1Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/
cve@mitre.orghttps://www.djangoproject.com/weblog/2016/nov/01/security-releases/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2017/dsa-3835
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94069Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037159Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3115-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2016/nov/01/security-releases/Release Notes, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE21DA5F-C086-4E98-A5DD-2B96731B56D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE31960-7C68-42F3-B215-B30A87DB67CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AFB20FA-CB00-4729-AB3A-816454C6D096",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A18691A7-E4D0-48A4-81A7-89846E991AF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C06EBD9-381E-4018-BFDC-E23EA18097B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D134048-B64F-45AE-B4A2-26E516CCF37B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "64A4030E-F51F-4944-BCE7-E27CD32EC7D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC1F046-DAF7-4734-9F80-A3C57857AF18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "61EE8536-0E8D-477A-B8EA-817CE21D516A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "483D0F44-15C8-43A2-B3AE-331F40DA1A80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BCCB794-1F30-4FC2-A63A-BCE7539BE5DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D36984-4C8E-4CDB-8D15-445705FCECF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B324AE6-ADD8-41B9-B250-A6577ACBB364",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6487058-6768-4AD3-BE27-A0B3D1ACFC08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CFF0538-B111-44A8-ADC2-87E280186257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3343FF8-53EC-459D-B31C-CD363D04FF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9B637E9-067A-4473-9B50-433CCC177982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "99A5BF6D-631B-4C8E-9868-579BD79100C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "280B9958-9163-4126-910A-2EF4B408DFCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A40373B-301E-4B81-8FA5-28D916142F59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "79BB3174-7859-4195-B7B3-BCAA280A6F80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "42EF41AF-B2FA-468A-B161-D9FE29CE53EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DF0100-F98E-4997-A8F7-DC07FA4A06D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECDC5647-8EA7-4595-88C2-541BC489ED2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
                     matchCriteriaId: "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
                     matchCriteriaId: "772E9557-A371-4664-AE2D-4135AAEB89AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.",
      },
      {
         lang: "es",
         value: "Django 1.8.x en versiones anteriores a 1.8.16, 1.9.x en versiones anteriores a 1.9.11 y 1.10.x en versiones anteriores a 1.10.3 utiliza una contraseña embebida para un usuario de base de datos temporal creada al ejecutar pruebas con una base de datos Oracle, lo que hace más fácil a atacantes remotos obtener acceso al servidor de la base de datos aprovechando el fallo para especificar manualmente una contraseña en la configuración del diccionario TEST de la base de datos.",
      },
   ],
   id: "CVE-2016-9013",
   lastModified: "2024-11-21T03:00:26.243",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-12-09T20:59:05.657",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94069",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1037159",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3115-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1037159",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3115-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/nov/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-08-07 20:49
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C38224F-C41B-428C-89C2-603BBA95AD3C",
                     versionEndExcluding: "4.2.15",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3384B57C-DBF5-4E23-99E7-92B260D53E8E",
                     versionEndExcluding: "5.0.8",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. Los filtros de plantilla urlize() y urlizetrunc() están sujetos a un posible ataque de denegación de servicio a través de entradas muy grandes con una secuencia específica de caracteres.",
      },
   ],
   id: "CVE-2024-41990",
   lastModified: "2024-08-07T20:49:50.480",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2024-08-07T15:15:56.100",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-130",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-10-04 17:55
Modified
2024-11-21 01:58
Severity ?
Summary
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-1521.html
cve@mitre.orghttp://seclists.org/oss-sec/2013/q3/369
cve@mitre.orghttp://seclists.org/oss-sec/2013/q3/411
cve@mitre.orghttp://secunia.com/advisories/54476Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2740
cve@mitre.orghttp://www.securityfocus.com/bid/61777
cve@mitre.orghttp://www.securitytracker.com/id/1028915
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/86437
cve@mitre.orghttps://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f
cve@mitre.orghttps://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762
cve@mitre.orghttps://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a
cve@mitre.orghttps://www.djangoproject.com/weblog/2013/aug/13/security-releases-issuedPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1521.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/oss-sec/2013/q3/369
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/oss-sec/2013/q3/411
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54476Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2740
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/61777
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1028915
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/86437
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issuedPatch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by \"the login view in django.contrib.auth.views\" and the javascript: scheme.",
      },
      {
         lang: "es",
         value: "La función is_safe_url en utils/http.py de Django 1.4.x anterior a la versión 1.4.6, 1.5.x anterior a la versión 1.5.2, y 1.6 anterior a beta 2 trata un esquema de URL como seguro incluso si no es HTTP o HTTPS, lo que podría permitir XSS u otras vulnerabilidades en aplicaciones Django que usen esta función, como se ha demostrado con \"la vista de inicio de sesión en django.contrib.auth.views\" y el javascript: scheme.",
      },
   ],
   id: "CVE-2013-6044",
   lastModified: "2024-11-21T01:58:40.717",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2013-10-04T17:55:10.040",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://seclists.org/oss-sec/2013/q3/369",
      },
      {
         source: "cve@mitre.org",
         url: "http://seclists.org/oss-sec/2013/q3/411",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54476",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2013/dsa-2740",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/61777",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1028915",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2013-1521.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://seclists.org/oss-sec/2013/q3/369",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://seclists.org/oss-sec/2013/q3/411",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2013/dsa-2740",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/61777",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1028915",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86437",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/ec67af0bd609c412b76eaa4cc89968a2a8e5ad6a",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-07-14 17:59
Modified
2024-11-21 02:32
Severity ?
Summary
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
Impacted products
Vendor Product Version
djangoproject django 1.8.0
djangoproject django 1.8.1
djangoproject django 1.8.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.",
      },
      {
         lang: "es",
         value: "validators.URLValidator en Django 1.8.x anteriores a 1.8.3 permite a atacantes causar una denegación de servicios mediante el consumo de la CPU a través de vectores no especificados.",
      },
   ],
   id: "CVE-2015-5145",
   lastModified: "2024-11-21T02:32:26.440",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-07-14T17:59:08.400",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75691",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032820",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/201510-06",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75691",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032820",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/201510-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-02 06:15
Modified
2024-11-21 08:29
Summary
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9909EFAF-C1C8-49FA-860F-C2430EC5304D",
                     versionEndExcluding: "3.2.23",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED58B2B-B564-4EE4-AE69-1E206AE34B65",
                     versionEndExcluding: "4.1.13",
                     versionStartIncluding: "4.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76F97FB-F751-4E8A-B4CD-43ECEA9528CE",
                     versionEndExcluding: "4.2.7",
                     versionStartIncluding: "4.2.",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 3.2 anterior a 3.2.23, 4.1 anterior a 4.1.13 y 4.2 anterior a 4.2.7. La normalización de NFKC es lenta en Windows. Como consecuencia, django.contrib.auth.forms.UsernameField está sujeto a un potencial ataque DoS (denegación de servicio) a través de ciertas entradas con una gran cantidad de caracteres Unicode.",
      },
   ],
   id: "CVE-2023-46695",
   lastModified: "2024-11-21T08:29:05.987",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-02T06:15:08.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20231214-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20231214-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-09-23 20:55
Modified
2024-11-21 01:49
Severity ?
Summary
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.",
      },
      {
         lang: "es",
         value: "El framework de autenticación (django.contrib.auth) en Django 1.4.x anteriores a 1.4.8, 1.5.x anteriores a 1.5.4, y 1.6.x anteriores a 1.6 beta 4 permite a atacantes remotos causar denegación de servicio (consumo de CPU) a través de una contraseña larga al ser luego procesada por una función de resumen (hashed).",
      },
   ],
   id: "CVE-2013-1443",
   lastModified: "2024-11-21T01:49:35.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-09-23T20:55:07.260",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
      },
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html",
      },
      {
         source: "security@debian.org",
         url: "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2013/dsa-2758",
      },
      {
         source: "security@debian.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/sep/15/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2013/dsa-2758",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2013/sep/15/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-02 14:59
Modified
2024-11-21 02:30
Severity ?
Summary
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.
Impacted products
Vendor Product Version
djangoproject django 1.8.0
djangoproject django 1.8.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not properly flush the session, which allows remote attackers to hijack user sessions via an empty string in the session key.",
      },
      {
         lang: "es",
         value: "La función session.flush en el backend cached_db en Django 1.8.x anterior a 1.8.2 no vacía correctamente la sesión, lo que permite a atacantes remotos secuestrar las sesiones de usuarios a través de una cadena vacía en la clave de la sesión.",
      },
   ],
   evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/384.html\">CWE-384: Session Fixation</a>",
   id: "CVE-2015-3982",
   lastModified: "2024-11-21T02:30:12.190",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-02T14:59:10.987",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/74960",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/may/20/security-release/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/74960",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/may/20/security-release/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA690BD-2FBA-425B-AC6F-046081E21183",
                     versionEndIncluding: "1.4.13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFC18F77-77CB-45CB-869E-267DACD19601",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.",
      },
      {
         lang: "es",
         value: "El middleware contrib.auth.middleware.RemoteUserMiddleware en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3, cuando utiliza el backend contrib.auth.backends.RemoteUserBackend, permite a usuarios remotos autenticados secuestrar sesiones web a través de vectores relacionados con la cabecera REMOTE_USER.",
      },
   ],
   id: "CVE-2014-0482",
   lastModified: "2024-11-21T02:02:13.663",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-08-26T14:55:05.297",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 19:15
Modified
2024-11-21 04:35
Severity ?
Summary
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
References
cve@mitre.orghttp://packetstormsecurity.com/files/155872/Django-Account-Hijack.html
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/
cve@mitre.orghttps://seclists.org/bugtraq/2020/Jan/9
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200110-0003/
cve@mitre.orghttps://usn.ubuntu.com/4224-1/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2020/dsa-4598
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/dec/18/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2020/Jan/9
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200110-0003/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4224-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4598
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/dec/18/security-releases/Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B19BDC93-017C-444E-BE89-E5951564C6F1",
                     versionEndExcluding: "1.11.27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "72FE3431-6956-4197-B0B7-9263888FF1FC",
                     versionEndExcluding: "2.2.9",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C23D9FE4-31F5-4A23-916E-8EC763886DC9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)",
      },
      {
         lang: "es",
         value: "Django versiones anteriores a 1.11.27, versiones 2.x anteriores a 2.2.9 y versiones 3.x anteriores a 3.0.1, permite tomar el control de la cuenta. Una dirección de correo electrónico diseñada adecuadamente (que es igual a la dirección de correo electrónico de un usuario existente después de la transformación de mayúsculas y minúsculas de los caracteres Unicode) permitiría a un atacante enviarle un token de restablecimiento de contraseña para la cuenta de usuario coincidente. (Una mitigación en las nuevas versiones es enviar tokens de restablecimiento de contraseña solo a la dirección de correo electrónico del usuario registrado).",
      },
   ],
   id: "CVE-2019-19844",
   lastModified: "2024-11-21T04:35:30.833",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T19:15:11.780",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2020/Jan/9",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200110-0003/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4224-1/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2020/dsa-4598",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2020/Jan/9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200110-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4224-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2020/dsa-4598",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/dec/18/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-640",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-09 20:29
Modified
2024-11-21 04:12
Summary
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
References
cve@mitre.orghttp://www.securityfocus.com/bid/103361Third Party Advisory, VDB Entry
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2018:2927Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2019:0051Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2019:0082Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2019:0265Third Party Advisory
cve@mitre.orghttps://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2
cve@mitre.orghttps://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16
cve@mitre.orghttps://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2018/03/msg00006.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/3591-1/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2018/dsa-4161Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2018/mar/06/security-releases/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/103361Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:2927Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:0051Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:0082Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:0265Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2018/03/msg00006.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3591-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2018/dsa-4161Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2018/mar/06/security-releases/Release Notes, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96EB9D8B-0C33-4380-ACAB-D6E1C5962A34",
                     versionEndExcluding: "1.8.19",
                     versionStartIncluding: "1.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74E078B-62BB-4152-A18D-56CC11C0CF79",
                     versionEndExcluding: "1.11.11",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA9B61A1-0ED0-412E-B8A4-DE09598CC2A9",
                     versionEndExcluding: "2.0.3",
                     versionStartIncluding: "2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
                     matchCriteriaId: "704CFA1A-953E-4105-BFBE-406034B83DED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.",
      },
      {
         lang: "es",
         value: "Se ha descubierto un problema en Django, en versiones 2.0 anteriores a la 2.0.3; versiones 1.11 anteriores a la 1.11.11 y versiones 1.8 anteriores a la 1.8.19. La función django.utils.html.urlize() fue extremadamente lenta a la hora de evaluar ciertas entradas debido a vulnerabilidades catastróficas de búsqueda hacia atrás en dos expresiones regulares (solo una en el caso de las versiones 1.8.x de Django). La función urlize() se emplea para implementar las plantillas de filtro urlize y urlizetrunc que, por lo tanto, eran vulnerables.",
      },
   ],
   id: "CVE-2018-7536",
   lastModified: "2024-11-21T04:12:19.070",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-09T20:29:00.613",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/103361",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2927",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0051",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0082",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0265",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3591-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/103361",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2927",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0051",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0265",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3591-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/mar/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-185",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-07-14 17:59
Modified
2024-11-21 02:32
Severity ?
Summary
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1678.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1686.html
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3305Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/75666
cve@mitre.orghttp://www.securitytracker.com/id/1032820
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2671-1Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201510-06
cve@mitre.orghttps://www.djangoproject.com/weblog/2015/jul/08/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1678.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1686.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3305Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/75666
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032820
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2671-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201510-06
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/jul/08/security-releases/Patch, Vendor Advisory
Impacted products
Vendor Product Version
djangoproject django 1.4.20
djangoproject django 1.5
djangoproject django 1.5
djangoproject django 1.5
djangoproject django 1.5.1
djangoproject django 1.5.2
djangoproject django 1.5.3
djangoproject django 1.5.4
djangoproject django 1.5.5
djangoproject django 1.5.6
djangoproject django 1.5.7
djangoproject django 1.5.8
djangoproject django 1.5.9
djangoproject django 1.5.10
djangoproject django 1.5.11
djangoproject django 1.5.12
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6.1
djangoproject django 1.6.2
djangoproject django 1.6.3
djangoproject django 1.6.4
djangoproject django 1.6.5
djangoproject django 1.6.6
djangoproject django 1.6.7
djangoproject django 1.6.8
djangoproject django 1.6.9
djangoproject django 1.6.10
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7.1
djangoproject django 1.7.2
djangoproject django 1.7.3
djangoproject django 1.7.4
djangoproject django 1.7.5
djangoproject django 1.7.6
djangoproject django 1.7.7
djangoproject django 1.7.8
djangoproject django 1.7.9
djangoproject django 1.8.0
djangoproject django 1.8.1
djangoproject django 1.8.2
debian debian_linux 7.0
debian debian_linux 8.0
oracle solaris 11.3
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.04
canonical ubuntu_linux 15.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE466393-EE2B-44AD-8C69-D4C34A773FFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFC18F77-77CB-45CB-869E-267DACD19601",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B3937A5-D537-4A9A-B7EF-0F7C441EE520",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B63ECA8-0AD0-4670-B026-6762DCC65D15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB39F768-9616-4C56-9613-55A5229DDCA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "9074F301-7595-464A-8DE5-41E78E5EE804",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "32DDDBEB-6F2F-4BA9-876D-38D41BA29726",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "61680046-51CD-4217-AC1E-C11265205DB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DAD077F-A239-4021-890E-AD4D9D9A388D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2DCD8E1-EF0F-4878-8952-E0F729A524C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3CB49AF-2A89-4277-B2E9-67803A395A23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E88A537F-F4D0-46B9-9E37-965233C2A355",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.",
      },
      {
         lang: "es",
         value: "La sesión Backend en Django anteriores a 1.4.21, de 1.5.x hasta 1.6.x, 1.7.x anteriores a 1.7.9 y 1.8.x anteriores a 1.8.3, permite a un atacante causar una denegación de servicios mediante el consumo de almacenamiento de sesión a través de múltiples peticiones con una única clave de sesión.",
      },
   ],
   id: "CVE-2015-5143",
   lastModified: "2024-11-21T02:32:26.090",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-07-14T17:59:06.227",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1678.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1686.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3305",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75666",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032820",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2671-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/201510-06",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1678.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2015-1686.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3305",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75666",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032820",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2671-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/201510-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-04-06 15:15
Modified
2024-11-21 06:00
Summary
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EF13F74-904C-46BE-89F3-0D530D89961D",
                     versionEndExcluding: "2.2.20",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5308A30-2968-42DB-88E3-9C1A546E8F4F",
                     versionEndExcluding: "3.0.14",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA1FCB48-4616-4383-9C3D-7C86A05F260B",
                     versionEndExcluding: "3.1.8",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.",
      },
      {
         lang: "es",
         value: "En Django versiones 2.2 anteriores a 2.2.20, versiones 3.0 anteriores a 3.0.14 y versiones 3.1 anteriores a 3.1.8, MultiPartParser permitía un salto de directorio por medio de archivos cargados con nombres de archivo adecuadamente diseñados.&#xa0;Los controladores de carga integrados no están afectados por esta vulnerabilidad",
      },
   ],
   id: "CVE-2021-28658",
   lastModified: "2024-11-21T06:00:02.827",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-04-06T15:15:13.437",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.1/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210528-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.1/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/g/django-announce/c/ePr5j-ngdPU",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210528-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/apr/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-07-31 17:55
Modified
2024-11-21 01:40
Severity ?
Summary
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "225CA836-30A5-45C2-8AF2-F11D95170303",
                     versionEndIncluding: "1.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "E670BDE4-85E8-472F-B639-CB4CA53070A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "A6508CE5-0556-4889-9380-B6B06B79F515",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "1EEC80B3-36F1-48C7-A4C0-2144613E7C81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "D827F8B8-60D5-443C-B8B6-AAFE7122DB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "CE5C74F9-41EB-4D29-BB68-A2C6F5E6FF52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "F1694141-3247-46A3-9539-117016A100F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "CE66E695-67CC-418E-930B-F002CFDDA3E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "573ACC2E-1FAA-4609-8372-8C1A94C136A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "D7B67974-4584-411B-90BB-2D7BF06A8F42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "89E29453-349B-4A50-8C8A-36550AFB6771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*",
                     matchCriteriaId: "476CDAAC-84F9-42F8-BABC-121AD9674B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "19959A8A-7FF9-4318-803D-5CD9F866F795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "9696406B-76A8-40C8-BD92-0A7ACBB53354",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "33D378F8-CFDC-4882-A838-406ABA7AD8CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.",
      },
      {
         lang: "es",
         value: "La función get_image_dimensions en la funcionalidad image-handling en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 un tamaño de trozo constante en todos los intentos por determinar las dimensiones, lo que permitiría a atacantes remotos a provocar una denegación de servicio (consumo del proceso o hilo) a través de una imagen TIFF grande.",
      },
   ],
   id: "CVE-2012-3444",
   lastModified: "2024-11-21T01:40:53.403",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-07-31T17:55:04.623",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2012/dsa-2529",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1560-1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2012/dsa-2529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/07/31/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1560-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-07-14 17:59
Modified
2024-11-21 02:32
Severity ?
Summary
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3305Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/75665
cve@mitre.orghttp://www.securitytracker.com/id/1032820
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2671-1Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201510-06
cve@mitre.orghttps://www.djangoproject.com/weblog/2015/jul/08/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3305Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/75665
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032820
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2671-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201510-06
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/jul/08/security-releases/Vendor Advisory
Impacted products
Vendor Product Version
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.04
canonical ubuntu_linux 15.10
djangoproject django *
djangoproject django 1.5
djangoproject django 1.5
djangoproject django 1.5
djangoproject django 1.5.1
djangoproject django 1.5.2
djangoproject django 1.5.3
djangoproject django 1.5.4
djangoproject django 1.5.5
djangoproject django 1.5.6
djangoproject django 1.5.7
djangoproject django 1.5.8
djangoproject django 1.5.9
djangoproject django 1.5.10
djangoproject django 1.5.11
djangoproject django 1.5.12
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6
djangoproject django 1.6.1
djangoproject django 1.6.2
djangoproject django 1.6.3
djangoproject django 1.6.4
djangoproject django 1.6.5
djangoproject django 1.6.6
djangoproject django 1.6.7
djangoproject django 1.6.8
djangoproject django 1.6.9
djangoproject django 1.6.10
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7
djangoproject django 1.7.1
djangoproject django 1.7.2
djangoproject django 1.7.3
djangoproject django 1.7.4
djangoproject django 1.7.5
djangoproject django 1.7.6
djangoproject django 1.7.7
djangoproject django 1.7.8
djangoproject django 1.7.9
djangoproject django 1.8
djangoproject django 1.8.0
djangoproject django 1.8.1
djangoproject django 1.8.2
debian debian_linux 7.0
debian debian_linux 8.0
oracle solaris 11.3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E88A537F-F4D0-46B9-9E37-965233C2A355",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F14869-45E4-4A7D-827D-B769A605B575",
                     versionEndIncluding: "1.4.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFC18F77-77CB-45CB-869E-267DACD19601",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B3937A5-D537-4A9A-B7EF-0F7C441EE520",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B63ECA8-0AD0-4670-B026-6762DCC65D15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB39F768-9616-4C56-9613-55A5229DDCA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "9074F301-7595-464A-8DE5-41E78E5EE804",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "32DDDBEB-6F2F-4BA9-876D-38D41BA29726",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "61680046-51CD-4217-AC1E-C11265205DB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DAD077F-A239-4021-890E-AD4D9D9A388D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2DCD8E1-EF0F-4878-8952-E0F729A524C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3CB49AF-2A89-4277-B2E9-67803A395A23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "8086E8D8-25AD-4F63-BFB2-4AA3FA25484D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DC23A3EC-942C-4B8D-A3D1-AC7C6526BF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.",
      },
      {
         lang: "es",
         value: "Django antes de 1.4.21, de 1.5.x hasta 1.6.x, 1.7.x anteriores a 1.7.9 y 1.8.x anteriores a 1.8.3 utiliza una expresión regular incorrecta lo que permite a atacantes remotos inyectar cabeceras arbitrarias para realizar ataques de división de respuesta HTTP a través de un caracter de nueva línea en (1) mensaje de correo electrónico al EmailValidator, ( 2 ) una URL al URLValidator o vectores no especificados en el ( 3 ) validate_ipv4_address o (4 ) validador validate_slug.",
      },
   ],
   id: "CVE-2015-5144",
   lastModified: "2024-11-21T02:32:26.270",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-07-14T17:59:07.493",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3305",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75665",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032820",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2671-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/201510-06",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3305",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75665",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032820",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2671-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/201510-06",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jul/08/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-08-03 17:29
Modified
2024-11-21 03:49
Summary
django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93F54FB8-94F4-4EFF-BC4F-70AE1A69DBA2",
                     versionEndExcluding: "1.11.15",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "589C9BE3-5032-4D66-BC99-F46B4B7924C2",
                     versionEndExcluding: "2.0.8",
                     versionStartIncluding: "2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "B85E9B9B-ADDB-4D2F-A857-685BD30CE856",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.",
      },
      {
         lang: "es",
         value: "django.middleware.common.CommonMiddleware en Django en versiones 1.11.x anteriores a la 1.11.15 y versiones 2.0.x anteriores a la 2.0.8 tiene una redirección abierta.",
      },
   ],
   id: "CVE-2018-14574",
   lastModified: "2024-11-21T03:49:20.143",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-08-03T17:29:00.250",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/104970",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041403",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0265",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3726-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4264",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/104970",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041403",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:0265",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3726-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4264",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/aug/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-601",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-10-04 17:55
Modified
2024-11-21 01:55
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de XSS en el widget AdminURLFieldWidget en contrib/admin/widgets.py de Django 1.5.x anterior a la versión 1.5.2 y 1.6.x anterior a 1.6 beta 2 permite a atacantes remotos inyectar script web arbitrario o HTML a través de una URLField.",
      },
   ],
   id: "CVE-2013-4249",
   lastModified: "2024-11-21T01:55:12.860",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2013-10-04T17:55:09.807",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://seclists.org/oss-sec/2013/q3/369",
      },
      {
         source: "secalert@redhat.com",
         url: "http://seclists.org/oss-sec/2013/q3/411",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54476",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securitytracker.com/id/1028915",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://seclists.org/oss-sec/2013/q3/369",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://seclists.org/oss-sec/2013/q3/411",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1028915",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/86438",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-02-14 21:00
Modified
2024-11-21 01:24
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/02/09/6Patch
secalert@redhat.comhttp://secunia.com/advisories/43230
secalert@redhat.comhttp://secunia.com/advisories/43297
secalert@redhat.comhttp://secunia.com/advisories/43382
secalert@redhat.comhttp://secunia.com/advisories/43426
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2163
secalert@redhat.comhttp://www.djangoproject.com/weblog/2011/feb/08/security/Patch, Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:031
secalert@redhat.comhttp://www.securityfocus.com/bid/46296
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1066-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0372
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0388
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0429
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0439
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0441
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=676359Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/02/09/6Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43230
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43297
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43382
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43426
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2163
af854a3a-2127-422b-91ae-364da2661108http://www.djangoproject.com/weblog/2011/feb/08/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:031
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46296
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1066-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0372
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0388
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0429
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0439
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0441
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=676359Patch



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.",
      },
      {
         lang: "es",
         value: "Vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Django v1.1.x anteriores a v1.1.4 y v1.2.x anteriores a v1.2.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del nombre de fichero vinculado a la subida de un archivo.\r\n",
      },
   ],
   id: "CVE-2011-0697",
   lastModified: "2024-11-21T01:24:38.310",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2011-02-14T21:00:03.273",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/09/6",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43230",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43297",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43382",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/43426",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2011/dsa-2163",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/46296",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-1066-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0372",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0388",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0429",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0439",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0441",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=676359",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/09/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43230",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43297",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43382",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43426",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.djangoproject.com/weblog/2011/feb/08/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/46296",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1066-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0372",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0388",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0429",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0439",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0441",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=676359",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2015-0026.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
secalert@redhat.comhttp://secunia.com/advisories/62285
secalert@redhat.comhttp://secunia.com/advisories/62309
secalert@redhat.comhttp://secunia.com/advisories/62718
secalert@redhat.comhttp://ubuntu.com/usn/usn-2469-1Patch, Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:036
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:109
secalert@redhat.comhttps://www.djangoproject.com/weblog/2015/jan/13/security/Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2015-0026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62285
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62309
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62718
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-2469-1Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/jan/13/security/Exploit, Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E636F6CA-1979-43DA-A12F-23EC009B4A65",
                     versionEndIncluding: "1.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5463AB51-6088-473A-BB54-BB78ACFC6DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "72653EB4-CE19-42FC-9C99-5CB391DABE7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*",
                     matchCriteriaId: "823E02CA-A145-46C2-BC4C-16DECB060B19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*",
                     matchCriteriaId: "E685F933-7C10-49B6-9F4B-89478AF51761",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A63F39-30BE-443F-AF10-6245587D3359",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.",
      },
      {
         lang: "es",
         value: "La visualización django.views.static.serve en Django anterior a 1.4.18, 1.6.x anterior a 1.6.10, y 1.7.x anterior a 1.7.3 lee ficheros por líneas enteras, lo que permite a atacantes remotos causar una denegación de servicio (consumo de memoria) a través de una línea larga en un fichero.",
      },
   ],
   id: "CVE-2015-0221",
   lastModified: "2024-11-21T02:22:34.950",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-01-16T16:59:20.420",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62718",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2469-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62718",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2469-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-01-16 16:59
Modified
2024-11-21 02:22
Severity ?
Summary
ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2015-0026.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
secalert@redhat.comhttp://secunia.com/advisories/62285
secalert@redhat.comhttp://secunia.com/advisories/62309
secalert@redhat.comhttp://ubuntu.com/usn/usn-2469-1Patch, Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:109
secalert@redhat.comhttps://www.djangoproject.com/weblog/2015/jan/13/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2015-0026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62285
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62309
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-2469-1Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2015/jan/13/security/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*",
                     matchCriteriaId: "823E02CA-A145-46C2-BC4C-16DECB060B19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*",
                     matchCriteriaId: "E685F933-7C10-49B6-9F4B-89478AF51761",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A63F39-30BE-443F-AF10-6245587D3359",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E636F6CA-1979-43DA-A12F-23EC009B4A65",
                     versionEndIncluding: "1.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5463AB51-6088-473A-BB54-BB78ACFC6DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "72653EB4-CE19-42FC-9C99-5CB391DABE7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.",
      },
      {
         lang: "es",
         value: "ModelMultipleChoiceField en Django 1.6.x anterior a 1.6.10 y 1.7.x anterior a 1.7.3, cuando show_hidden_initial está configurado a 'True', permite a atacantes remotos causar una denegación de servicio mediante la presentación de valores duplicados, lo que provoca un número grande de consultas SQL.",
      },
   ],
   id: "CVE-2015-0222",
   lastModified: "2024-11-21T02:22:35.093",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-01-16T16:59:21.217",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2469-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://advisories.mageia.org/MGASA-2015-0026.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62285",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/62309",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2469-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/jan/13/security/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-17",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-05 00:15
Modified
2024-11-21 06:32
Summary
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E20BDA6F-5744-4B52-B995-529E3A14EF69",
                     versionEndExcluding: "2.2.26",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E0CB9E7-6BFE-4732-872F-1DE2BFCA9223",
                     versionEndExcluding: "3.2.11",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAF6F5EA-00FA-4871-A06F-0F6F7DF1D06D",
                     versionEndExcluding: "4.0.1",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.",
      },
      {
         lang: "es",
         value: "El archivo Storage.save en Django versiones 2.2 anteriores a 2.2.26, 3.2 anteriores a 3.2.11 y 4.0 anteriores a 4.0.1, permite un salto de directorio si le es pasado directamente nombres de archivos diseñados.",
      },
   ],
   id: "CVE-2021-45452",
   lastModified: "2024-11-21T06:32:14.330",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-05T00:15:07.997",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220121-0005/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jan/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-04-08 15:59
Modified
2024-11-21 02:48
Summary
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
References
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0502.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0504.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0505.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0506.html
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3544
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
cve@mitre.orghttp://www.securityfocus.com/bid/83879
cve@mitre.orghttp://www.securitytracker.com/id/1035152
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2915-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2915-2
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2915-3
cve@mitre.orghttps://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
cve@mitre.orghttps://www.djangoproject.com/weblog/2016/mar/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0502.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0504.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0505.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0506.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3544
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/83879
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035152
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2915-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2915-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2915-3
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2016/mar/01/security-releases/Vendor Advisory
Impacted products
Vendor Product Version
djangoproject django 1.8.9
djangoproject django 1.9
djangoproject django 1.9.1
djangoproject django 1.9.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "99A5BF6D-631B-4C8E-9868-579BD79100C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\\@attacker.com.",
      },
      {
         lang: "es",
         value: "La función utils.http.is_safe_url en Django en versiones anteriores a 1.8.10 y 1.9.x en versiones anteriores a 1.9.3 permite a atacantes remotos redirigir a usuarios a páginas web arbitrarias y llevar a cabo ataques de phishing o posiblemente llevar a cabo ataques de XSS a través de una URL que contiene autenticación básica, según lo demostrado por http://mysite.example.com\\@attacker.com.",
      },
   ],
   id: "CVE-2016-2512",
   lastModified: "2024-11-21T02:48:35.683",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-04-08T15:59:06.183",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2016/dsa-3544",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/83879",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1035152",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2915-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2915-2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2915-3",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2016/dsa-3544",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/83879",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1035152",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2915-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2915-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2915-3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-03 14:15
Modified
2024-11-21 05:00
Summary
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
References
cve@mitre.orghttps://docs.djangoproject.com/en/3.0/releases/security/Release Notes, Vendor Advisory
cve@mitre.orghttps://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJMailing List, Release Notes, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2020/06/msg00016.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200611-0002/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4381-1/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4381-2/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2020/dsa-4705Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2020/jun/03/security-releases/Release Notes, Vendor Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/3.0/releases/security/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJMailing List, Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/06/msg00016.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200611-0002/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4381-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4381-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4705Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2020/jun/03/security-releases/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93BB1B8B-778D-4625-BCA4-245FA7CB7EB3",
                     versionEndExcluding: "2.2.13",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8843BC60-8D53-469D-A194-BB5259C317E8",
                     versionEndExcluding: "3.0.7",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:sra_plugin:-:*:*:*:*:linux:*:*",
                     matchCriteriaId: "96EEC4C4-E4A9-4CB3-8801-2DD26C00AC8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 2.2  anteriores a 2.2.13 y  versiones 3.0 anteriores a 3.0.7. En casos donde un backend memcached no lleva a cabo una comprobación de la clave, pasa claves de caché maliciosas que podría resultar en una colisión de claves y una potencial filtración de datos.",
      },
   ],
   id: "CVE-2020-13254",
   lastModified: "2024-11-21T05:00:53.270",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-03T14:15:12.563",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4705",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4381-2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4705",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2020/jun/03/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-295",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-04-08 15:59
Modified
2024-11-21 02:48
Summary
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
References
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0502.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0504.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0505.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0506.html
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3544
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
cve@mitre.orghttp://www.securityfocus.com/bid/83878
cve@mitre.orghttp://www.securitytracker.com/id/1035152
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2915-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2915-2
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2915-3
cve@mitre.orghttps://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab
cve@mitre.orghttps://www.djangoproject.com/weblog/2016/mar/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0502.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0504.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0505.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0506.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3544
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/83878
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035152
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2915-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2915-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2915-3
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2016/mar/01/security-releases/Vendor Advisory
Impacted products
Vendor Product Version
djangoproject django 1.8.9
djangoproject django 1.9
djangoproject django 1.9.1
djangoproject django 1.9.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "99A5BF6D-631B-4C8E-9868-579BD79100C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.",
      },
      {
         lang: "es",
         value: "El hasher de contraseñas en contrib/auth/hashers.py en Django en versiones anteriores a 1.8.10 y 1.9.x en versiones anteriores a 1.9.3 permite a atacantes remotos enumerar usuarios a través de un ataque de sincronización que implica peticiones de login.",
      },
   ],
   id: "CVE-2016-2513",
   lastModified: "2024-11-21T02:48:35.850",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:H/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 3.1,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.6,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-04-08T15:59:07.230",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2016/dsa-3544",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/83878",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1035152",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2915-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2915-2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2915-3",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0502.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0504.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0505.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2016-0506.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2016/dsa-3544",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/83878",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1035152",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2915-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2915-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2915-3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2016/mar/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-09-07 13:29
Modified
2024-11-21 03:10
Summary
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2541CE-0462-46DF-BDD8-C19D6E45140B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE31960-7C68-42F3-B215-B30A87DB67CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D6C6214-7946-4025-84E6-59448CFE75B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "58182835-CB1F-4490-AE65-90601DBFD0D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "04AE04CD-E923-4630-9BAA-5A4D5A5D0055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2517FB1C-B732-432B-9F27-EE60F6556433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "28F4BB27-B6AF-47AD-9301-DDFF4198B9F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC58EB0F-6DE0-450B-A963-2CA4084BDE71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "437E4D87-F5C9-4954-9882-396C0ADF649E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D64C7397-B2A8-4C93-AC09-337E243A7483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.11.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F3CDEA7-EFB7-4F4B-872B-1D18CDE340CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.11.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "08EFE4B2-E975-4842-BCAB-528D03F4AB73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with \"DEBUG = True\" (which makes this page accessible) in your production settings.",
      },
      {
         lang: "es",
         value: "En Django versiones 1.10.x anteriores a la 1.10.8 y versiones 1.11.x anteriores a la 1.11.5, se deshabilitó la función de autoescapado HTML en una parte de la plantilla para la página de depuración technical 500. En las condiciones adecuadas, esto permitiría un ataque de Cross-Site Scripting (XSS). Esta vulnerabilidad no debería afectar a la mayoría de sitios de producción, ya que no se debería ejecutar el programa con \"DEBUG = True\" (lo que hace que esta página sea accesible) en la configuración de producción.",
      },
   ],
   id: "CVE-2017-12794",
   lastModified: "2024-11-21T03:10:12.357",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-09-07T13:29:00.467",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/100643",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1039264",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/3559-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/100643",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1039264",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/3559-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2017/sep/05/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-05 03:29
Modified
2024-11-21 04:10
Summary
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.11.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8960615-7A77-4220-96C9-D4D6DAB0262A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.11.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "53095DC2-1819-4AA1-B70A-FEC2EE8178BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E24D7F-53EC-40D3-BEB9-0EB24FD676F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF6EB5B5-528E-4E91-98FE-CBF882C06B95",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.",
      },
      {
         lang: "es",
         value: "django.contrib.auth.forms.AuthenticationForm en Django 2.0 anterior a 2.0.2 y 1.11.8 y 1.11.9 permte que atacantes remotos obtengan información potencialmente sensible aprovechando la exposición de datos del método confirm_login_allowed(), tal y como se demuestra al descubrir si una cuenta de usuario está activa o no.",
      },
   ],
   id: "CVE-2018-6188",
   lastModified: "2024-11-21T04:10:15.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-05T03:29:00.267",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1040422",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3559-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1040422",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3559-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/feb/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-07 15:15
Modified
2024-08-08 20:35
Summary
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C38224F-C41B-428C-89C2-603BBA95AD3C",
                     versionEndExcluding: "4.2.15",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3384B57C-DBF5-4E23-99E7-92B260D53E8E",
                     versionEndExcluding: "5.0.8",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. El filtro de plantilla de formato flotante está sujeto a un consumo de memoria significativo cuando se le proporciona una representación de cadena de un número en notación científica con un exponente grande.",
      },
   ],
   id: "CVE-2024-41989",
   lastModified: "2024-08-08T20:35:11.140",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2024-08-07T15:15:56.030",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2024/aug/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-06 22:16
Modified
2024-11-21 08:59
Summary
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
References
cve@mitre.orghttps://docs.djangoproject.com/en/5.0/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announcePermissions Required
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
cve@mitre.orghttps://www.djangoproject.com/weblog/2024/feb/06/security-releases/Release Notes
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/5.0/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announcePermissions Required
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2024/feb/06/security-releases/Release Notes
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "527AB2FB-6590-4F90-B749-451EA45741FB",
                     versionEndExcluding: "3.2.24",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0C66920-1C09-4572-985B-8948D9DA1F11",
                     versionEndExcluding: "4.2.10",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD053762-6CAA-4F50-BE69-39F466C9079A",
                     versionEndExcluding: "5.0.2",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django 3.2 anterior a 3.2.24, 4.2 anterior a 4.2.10 y Django 5.0 anterior a 5.0.2. El filtro de plantilla intcomma estaba sujeto a un posible ataque de denegación de servicio cuando se utilizaba con cadenas muy largas.",
      },
   ],
   id: "CVE-2024-24680",
   lastModified: "2024-11-21T08:59:29.843",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-06T22:16:15.470",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/5.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
         ],
         url: "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/5.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:49
Summary
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
References
cve@mitre.orghttps://docs.djangoproject.com/en/4.0/releases/security/Patch, Third Party Advisory
cve@mitre.orghttps://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a
cve@mitre.orghttps://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468
cve@mitre.orghttps://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20220221-0003/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2022/dsa-5254Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2022/feb/01/security-releases/Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.0/releases/security/Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20220221-0003/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5254Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2022/feb/01/security-releases/Patch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7324BB5-64C7-45F6-ADEB-E0929B4B00B6",
                     versionEndExcluding: "2.2.27",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D15BB946-FCF5-43FC-99EF-EBB2513CA2FB",
                     versionEndExcluding: "3.2.12",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA09D497-21DD-410D-9692-A601B1EAA0B9",
                     versionEndExcluding: "4.0.2",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.",
      },
      {
         lang: "es",
         value: "Se ha detectado un problema en MultiPartParser en Django versiones 2.2 anteriores a 2.2.27, 3.2 anteriores a 3.2.12 y 4.0 anteriores a 4.0.2. Pasar determinadas entradas a formularios multiparte podía resultar en un bucle infinito cuando eran analizados los archivos",
      },
   ],
   id: "CVE-2022-23833",
   lastModified: "2024-11-21T06:49:20.623",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-03T02:15:07.623",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220221-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/feb/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-835",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 16:15
Modified
2024-10-30 17:35
Summary
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *
djangoproject django 5.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F4E9063-064F-4C6E-9985-7A049D38D299",
                     versionEndExcluding: "4.2.16",
                     versionStartIncluding: "4.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B3803EA-9D53-4E0B-A8E2-CB90D9677E75",
                     versionEndExcluding: "5.0.9",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A1AE023-D9C3-4D36-B17F-7F6F24E59EF2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).",
      },
      {
         lang: "es",
         value: "Se descubrió un problema en Django v5.1.1, v5.0.9 y v4.2.16. La clase django.contrib.auth.forms.PasswordResetForm, cuando se utiliza en una vista que implementa flujos de restablecimiento de contraseña, permite a atacantes remotos enumerar las direcciones de correo electrónico de los usuarios mediante el envío de solicitudes de restablecimiento de contraseña y la observación del resultado (solo cuando el envío de correo electrónico falla constantemente).",
      },
   ],
   id: "CVE-2024-45231",
   lastModified: "2024-10-30T17:35:10.147",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T16:15:11.997",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-203",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-11-18 23:55
Modified
2024-11-21 01:43
Severity ?
Summary
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
secalert@redhat.comhttp://secunia.com/advisories/51033Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/51314Vendor Advisory
secalert@redhat.comhttp://securitytracker.com/id?1027708
secalert@redhat.comhttp://ubuntu.com/usn/usn-1632-1
secalert@redhat.comhttp://ubuntu.com/usn/usn-1757-1
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2634
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/10/30/4
secalert@redhat.comhttp://www.osvdb.org/86493
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=865164
secalert@redhat.comhttps://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
secalert@redhat.comhttps://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
secalert@redhat.comhttps://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
secalert@redhat.comhttps://www.djangoproject.com/weblog/2012/oct/17/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51033Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51314Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1027708
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1632-1
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1757-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2634
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/10/30/4
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/86493
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=865164
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2012/oct/17/security/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "33D378F8-CFDC-4882-A838-406ABA7AD8CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "132795AE-92DD-42CB-A59E-5F7136F93B46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5BE262-260E-4250-8F68-7392FD68970E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18B54E2-447B-4B38-9E88-6833F67EB24C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.",
      },
      {
         lang: "es",
         value: "La función django.http.HttpRequest.get_host en Django v1.3.x antes de v1.3.4 y v1.4.x antes de v1.4.2, permite a atacantes remotos generar y mostrar URLs de su elección a través de nombre de usuario y contraseña de la cabecera Host manipulados.",
      },
   ],
   id: "CVE-2012-4520",
   lastModified: "2024-11-21T01:43:03.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-11-18T23:55:01.040",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/51033",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/51314",
      },
      {
         source: "secalert@redhat.com",
         url: "http://securitytracker.com/id?1027708",
      },
      {
         source: "secalert@redhat.com",
         url: "http://ubuntu.com/usn/usn-1632-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://ubuntu.com/usn/usn-1757-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2013/dsa-2634",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/10/30/4",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.osvdb.org/86493",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=865164",
      },
      {
         source: "secalert@redhat.com",
         url: "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3",
      },
      {
         source: "secalert@redhat.com",
         url: "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e",
      },
      {
         source: "secalert@redhat.com",
         url: "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/oct/17/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/51033",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/51314",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1027708",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://ubuntu.com/usn/usn-1632-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://ubuntu.com/usn/usn-1757-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2013/dsa-2634",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/10/30/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/86493",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=865164",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2012/oct/17/security/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-04 17:59
Modified
2024-11-21 03:31
Summary
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:a1:*:*:*:*:*:*",
                     matchCriteriaId: "85ED1834-500C-4E37-BD51-E42DB28F3B67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:b1:*:*:*:*:*:*",
                     matchCriteriaId: "E6E3323E-6AC0-4703-A3A4-A429946B0839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:b2:*:*:*:*:*:*",
                     matchCriteriaId: "7AB300FB-2A7D-498E-891D-E75DCA9ED7A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:c1:*:*:*:*:*:*",
                     matchCriteriaId: "1AC1822A-A7FE-4F38-BD5A-74388A5405D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2510BAD7-1FB6-4F6F-A2CC-9DE9AD39B4FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B388C7-ED4E-4416-969F-32263E7D7AA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D36984-4C8E-4CDB-8D15-445705FCECF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B324AE6-ADD8-41B9-B250-A6577ACBB364",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6487058-6768-4AD3-BE27-A0B3D1ACFC08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CFF0538-B111-44A8-ADC2-87E280186257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3343FF8-53EC-459D-B31C-CD363D04FF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9B637E9-067A-4473-9B50-433CCC177982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "99A5BF6D-631B-4C8E-9868-579BD79100C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "280B9958-9163-4126-910A-2EF4B408DFCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A40373B-301E-4B81-8FA5-28D916142F59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "79BB3174-7859-4195-B7B3-BCAA280A6F80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "42EF41AF-B2FA-468A-B161-D9FE29CE53EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DF0100-F98E-4997-A8F7-DC07FA4A06D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECDC5647-8EA7-4595-88C2-541BC489ED2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB571E66-C1B2-4FFD-8265-FB381CF4ACE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "C49F25DA-CD52-49A9-B5BE-63FD399A9813",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:a1:*:*:*:*:*:*",
                     matchCriteriaId: "0B4797F9-82E9-4BA8-868D-C6F18BA01DE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:b1:*:*:*:*:*:*",
                     matchCriteriaId: "E885D945-FB55-47F4-AA6B-462AFBDAD750",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "48BD4296-E83B-4563-9A39-70C95EEAA337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "F63D8C0A-D93E-4A1F-A8F8-D22314771AD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "019C26C7-EF1F-45BB-934E-521E2E64452E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A18691A7-E4D0-48A4-81A7-89846E991AF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C06EBD9-381E-4018-BFDC-E23EA18097B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D134048-B64F-45AE-B4A2-26E516CCF37B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39B83A-C10B-4B88-9491-2FB8B07D6EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "64A4030E-F51F-4944-BCE7-E27CD32EC7D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC1F046-DAF7-4734-9F80-A3C57857AF18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "61EE8536-0E8D-477A-B8EA-817CE21D516A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "483D0F44-15C8-43A2-B3AE-331F40DA1A80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD33E383-2772-4F79-A2C9-4F9EB8FBC8EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "77D82BAD-B2AE-49FB-AF71-393631D2B29C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2541CE-0462-46DF-BDD8-C19D6E45140B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:a1:*:*:*:*:*:*",
                     matchCriteriaId: "1763E8EB-F943-4A9A-8E19-E6BE9F847DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:b1:*:*:*:*:*:*",
                     matchCriteriaId: "48E20213-67BB-4A16-B961-502BA4E54A98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "3C71C2E3-C134-45B0-BDDC-FFE7612AB1EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE31960-7C68-42F3-B215-B30A87DB67CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3838B8E-8F0E-4F7A-88E6-FFF2590E5302",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D6C6214-7946-4025-84E6-59448CFE75B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "58182835-CB1F-4490-AE65-90601DBFD0D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "04AE04CD-E923-4630-9BAA-5A4D5A5D0055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2517FB1C-B732-432B-9F27-EE60F6556433",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.",
      },
      {
         lang: "es",
         value: "Una URL maliciosa manipulada a una sitio Django (1.10 en versiones anteriores a 1.10.7, 1.9 en versiones anteriores a 1.9.13, y 1.8 en versiones anteriores a 1.8.18) que usa la vista ``django.views.static.serve()`` podría redirigir a cualquier otro dominio, también conocido como una vulnerabilidad de redirección abierta.",
      },
   ],
   id: "CVE-2017-7234",
   lastModified: "2024-11-21T03:31:26.170",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-04T17:59:00.303",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97401",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1038177",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2017/dsa-3835",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97401",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1038177",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2017/apr/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-601",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-03-25 14:59
Modified
2024-11-21 02:27
Severity ?
Summary
The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1C288F-326B-497B-B26C-D26E01262DDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8431B-FEA1-4D94-B367-56E8678C3CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E7779A-EDB9-4871-8D7C-63C5A7C7A0DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB56113-5E66-4EE9-B551-FD40C2FE307B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2985241-279F-46AC-8BBF-DF2F439FE720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6D0F178-D3DE-4E1D-B666-B40262CDF9BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "32DDDBEB-6F2F-4BA9-876D-38D41BA29726",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06513AE1-11E4-4A9C-BDA4-D0511A9DCFC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6004EA17-A2B4-4E4C-A738-210FCAC2CA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "61680046-51CD-4217-AC1E-C11265205DB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4320AE65-B4A7-4CC3-8BE0-6CD4FFBC24C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E5B08A-E6FC-440C-A2F8-1D8B727D55E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DAD077F-A239-4021-890E-AD4D9D9A388D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3C0FF-C342-40F1-A187-CD212C16FE8F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A63F39-30BE-443F-AF10-6245587D3359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                     matchCriteriaId: "253C303A-E577-4488-93E6-68A8DD942C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.",
      },
      {
         lang: "es",
         value: "La función utils.html.strip_tags en Django 1.6.x anterior a 1.6.11, 1.7.x anterior a 1.7.7, y 1.8.x anterior a 1.8c1, cuando utiliza ciertos versiones de Python, permite a atacantes remotos causar una denegación de servicio (bucle infinito) mediante el incremento de la longitud de la cadena de entradas.",
      },
   ],
   id: "CVE-2015-2316",
   lastModified: "2024-11-21T02:27:11.993",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-03-25T14:59:02.940",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/73322",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2539-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/73322",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2539-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-08-02 15:15
Modified
2024-11-21 04:26
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/10/04/6
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2024/03/04/1
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Aug/15
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190828-0002/
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4498
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/04/6
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2024/03/04/1
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/15
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190828-0002/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4498
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49BD116-09A6-454E-BB68-65FCDE06DF33",
                     versionEndExcluding: "1.11.23",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D05096B-F60E-4DB2-AE59-EED55F945AB0",
                     versionEndExcluding: "2.1.11",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B",
                     versionEndExcluding: "2.2.4",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a  2.1.11 y versiones 2.2.x anteriores a 2.2.4. Si los métodos chars() y words() de django.utils.text.Truncator pasaron el argumento  html=True, fueron extremadamente lentos para evaluar ciertas entradas debido a una vulnerabilidad de retroceso catastrófico en una expresión regular. Los métodos chars() y words() se usan para implementar los filtros de plantilla truncatechars_html y truncatewords_html, que eran por lo tanto vulnerables.",
      },
   ],
   id: "CVE-2019-14232",
   lastModified: "2024-11-21T04:26:15.113",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2019-08-02T15:15:11.880",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2023/10/04/6",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2023/10/04/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-05-16 15:55
Modified
2024-11-21 02:08
Severity ?
Summary
The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
References
security@debian.orghttp://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlThird Party Advisory
security@debian.orghttp://secunia.com/advisories/61281
security@debian.orghttp://ubuntu.com/usn/usn-2212-1Third Party Advisory
security@debian.orghttp://www.debian.org/security/2014/dsa-2934Third Party Advisory
security@debian.orghttp://www.openwall.com/lists/oss-security/2014/05/14/10Third Party Advisory
security@debian.orghttp://www.openwall.com/lists/oss-security/2014/05/15/3Third Party Advisory
security@debian.orghttp://www.securityfocus.com/bid/67410Third Party Advisory, VDB Entry
security@debian.orghttps://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61281
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-2212-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2934Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/05/14/10Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/05/15/3Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/67410Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "7118F616-25CA-4E34-AA13-4D14BB62419F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F61F047-129C-41A6-8A27-FFCBB8563E91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by \"http:\\\\\\djangoproject.com.\"",
      },
      {
         lang: "es",
         value: "La función django.util.http.is_safe_url en Django 1.4 anterior a 1.4.13, 1.5 anterior a 1.5.8, 1.6 anterior a 1.6.5 y 1.7 anterior a 1.7b4 no valida debidamente URLs, lo que permite a atacantes remotos realizar ataques de redirección abierta a través de una URL malformada, tal y como fue demostrado por 'http:\\\\\\djangoproject.com.'",
      },
   ],
   id: "CVE-2014-3730",
   lastModified: "2024-11-21T02:08:44.627",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2014-05-16T15:55:05.440",
   references: [
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2212-1",
      },
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
      },
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
      },
      {
         source: "security@debian.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/67410",
      },
      {
         source: "security@debian.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-2212-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2014/dsa-2934",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2014/05/14/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2014/05/15/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/67410",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-10-19 10:55
Modified
2024-11-21 01:31
Severity ?
Summary
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96EC0AAD-1199-4CDB-B599-A7959A160CB6",
                     versionEndIncluding: "1.2.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "C40AD94B-AC89-4404-973F-5E60468D06EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
                     matchCriteriaId: "529CD787-1C98-4F20-8A3D-90BF2B0BD790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A952FB-3A74-4A39-8870-1F37059C9D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E79CFED-F8BF-48E7-897D-D1FB508DC9E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9023348-07A7-46E8-B45A-CC19563C5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "883C9BEA-8B02-42F7-90BB-F31CBCBF8B1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "59302184-7805-4D50-B25C-73E59DAA1E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56846659-96C8-497C-8404-3975E5B6385B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DAB4639-B81D-412A-A081-EFF46737CA5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF068CD9-B33A-4C51-9FBA-CFDAE91E174E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D338D9-1504-4933-B833-BD7F1864E89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD257D91-EF31-4103-9007-944603ABA271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "99387F31-9E04-4A73-A1C6-C05F96A8DB38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*",
                     matchCriteriaId: "F75FE4BB-2C64-404F-9347-25289556BE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "064C9403-8A43-42C7-A1FD-03CC49A32FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCDB95B-88F2-466A-A4F9-4C080183E39B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B99C62-A653-45C1-A061-05A8FAD52107",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA5071B-808F-490E-B407-37CD24ACCA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F5428AE-6B63-4D27-BCC4-F228264A6F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "AF1504F2-968F-4E1A-A143-BE494E658DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.",
      },
      {
         lang: "es",
         value: "django.contrib.sessions en Django v1.2.7 y v1.3.x antereiores a v1.3.1, cuando los datos de sesión se almacena en la caché, utiliza el espacio de nombres raíz de los identificadores de sesión las teclas y los datos de aplicación, lo que permite a atacantes remotos modificar un sesión mediante la activación de uso de una clave que es igual al identificador de sesión.",
      },
   ],
   id: "CVE-2011-4136",
   lastModified: "2024-11-21T01:31:55.020",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-10-19T10:55:03.927",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "cve@mitre.org",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2011/09/13/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/46614",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=737366",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://hermes.opensuse.org/messages/14700881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/09/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://www.djangoproject.com/weblog/2011/sep/10/127/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-02-02 07:15
Modified
2024-11-21 06:21
Summary
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "46A5C187-6988-47C2-9557-51DA3B5A5E43",
                     versionEndExcluding: "2.2.18",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC2B0286-FDDA-45E1-9996-FA5B8C53F0B1",
                     versionEndExcluding: "3.0.12",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A6BDD7A-AB21-442B-8137-7508B7E72ACC",
                     versionEndExcluding: "3.1.6",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by \"startapp --template\" and \"startproject --template\") allows directory traversal via an archive with absolute paths or relative paths with dot segments.",
      },
      {
         lang: "es",
         value: "En Django versiones 2.2 anteriores a 2.2.18, versiones 3.0 anteriores a 3.0.12 y versiones 3.1 anteriores a 3.1.6, el método django.utils.archive.extract (usado por \"startapp --template\" y \"startproject --template\") permite un salto de directorios por medio de un archivo con rutas absolutas o rutas relativas con segmentos de puntos",
      },
   ],
   id: "CVE-2021-3281",
   lastModified: "2024-11-21T06:21:12.677",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-02-02T07:15:14.020",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.1/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210226-0004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.1/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210226-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/feb/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-10-02 18:29
Modified
2024-11-21 03:53
Summary
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
Impacted products
Vendor Product Version
djangoproject django *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E62D06FC-9AAD-41BF-9A40-2800A0ECCAFB",
                     versionEndExcluding: "2.1.2",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the \"view\" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.",
      },
      {
         lang: "es",
         value: "Se ha descubierto un problema en Django, en versiones 2.1 anteriores a la 2.1.2, por el cual los usuarios no privilegiados pueden leer los hashes de contraseña de cuentas arbitrarias. El widget de contraseña de solo lectura empleada por el administrador de Django para mostrar un hash de contraseña ofuscada se omitía si un usuario tenía solo el permiso \"view\" (nuevo en Django 2.1), lo que resultaba en que el hash de contraseña completo se mostraba a esos usuarios. Esto podría resultar en una vulnerabilidad para sitios en los que las cuentas de usuario heredadas emplean hashes inseguros.",
      },
   ],
   id: "CVE-2018-16984",
   lastModified: "2024-11-21T03:53:39.057",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-10-02T18:29:01.430",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041749",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190502-0009/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/oct/01/security-release/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041749",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190502-0009/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2018/oct/01/security-release/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-03 05:15
Modified
2024-11-21 08:24
Summary
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2024/03/04/1
cve@mitre.orghttps://docs.djangoproject.com/en/4.2/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announcePermissions Required
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20231221-0001/
cve@mitre.orghttps://www.djangoproject.com/weblog/2023/oct/04/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2024/03/04/1
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.2/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announcePermissions Required
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20231221-0001/
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2023/oct/04/security-releases/Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BA393E1-3182-4225-9C9E-9ADEFDB870B5",
                     versionEndExcluding: "3.2.22",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A68CC8-3ABF-4E38-97AB-9AE50A6FBACF",
                     versionEndExcluding: "4.1.12",
                     versionStartIncluding: "4.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "80AE2E8A-697C-4495-84C0-A439EAA7D657",
                     versionEndExcluding: "4.2.6",
                     versionStartIncluding: "4.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.",
      },
      {
         lang: "es",
         value: "En Django 3.2 anterior a 3.2.22, 4.1 anterior a 4.1.12 y 4.2 anterior a 4.2.6, los métodos django.utils.text.Truncator chars() y palabras() (cuando se usan con html=True) están sujetos a un potencial Ataque DoS (denegación de servicio) a través de ciertas entradas con texto HTML muy largo y potencialmente mal formado. Los métodos chars() y palabras() se utilizan para implementar los filtros de plantilla truncatechars_html y truncatewords_html, que por tanto también son vulnerables. NOTA: este problema existe debido a una solución incompleta para CVE-2019-14232.",
      },
   ],
   id: "CVE-2023-43665",
   lastModified: "2024-11-21T08:24:34.663",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-03T05:15:30.047",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20231221-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2024/03/04/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20231221-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-02-15 13:15
Modified
2024-11-21 05:51
Summary
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
References
report@snyk.iohttp://www.openwall.com/lists/oss-security/2021/02/19/4Mailing List, Patch, Third Party Advisory
report@snyk.iohttp://www.openwall.com/lists/oss-security/2021/05/01/2Mailing List, Third Party Advisory
report@snyk.iohttps://github.com/python/cpython/pull/24297Patch, Third Party Advisory
report@snyk.iohttps://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
report@snyk.iohttps://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E
report@snyk.iohttps://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
report@snyk.iohttps://lists.debian.org/debian-lts-announce/2021/02/msg00030.htmlMailing List, Third Party Advisory
report@snyk.iohttps://lists.debian.org/debian-lts-announce/2021/04/msg00005.htmlMailing List, Third Party Advisory
report@snyk.iohttps://lists.debian.org/debian-lts-announce/2021/04/msg00015.htmlMailing List, Third Party Advisory
report@snyk.iohttps://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
report@snyk.iohttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
report@snyk.iohttps://security.gentoo.org/glsa/202104-04Third Party Advisory
report@snyk.iohttps://security.netapp.com/advisory/ntap-20210326-0004/Third Party Advisory
report@snyk.iohttps://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/Technical Description, Third Party Advisory
report@snyk.iohttps://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933Exploit, Third Party Advisory
report@snyk.iohttps://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
report@snyk.iohttps://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
report@snyk.iohttps://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
report@snyk.iohttps://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/02/19/4Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/05/01/2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/python/cpython/pull/24297Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/02/msg00030.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/04/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/04/msg00015.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202104-04Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20210326-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/Technical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB8842D9-B554-4B83-9E2E-0FAF292E448A",
                     versionEndExcluding: "3.6.13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEB52F35-D464-4C26-A253-1B96B2A4921A",
                     versionEndExcluding: "3.7.10",
                     versionStartIncluding: "3.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F40C09A-B9FD-40D7-B0A3-89C13DAD040B",
                     versionEndExcluding: "3.8.8",
                     versionStartIncluding: "3.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ECC4038-73C0-4AEA-99C2-3CFD7C283ABD",
                     versionEndExcluding: "3.9.2",
                     versionStartIncluding: "3.9.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:inventory_collect_tool:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2C13438-3C64-40A6-AA0D-327CB722888D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7CF3019-975D-40BB-A8A4-894E62BD3797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7BD0710-9119-4813-B605-AD61E46EC450",
                     versionEndExcluding: "2.2.19",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83059A91-A193-402A-966C-852841B3B84A",
                     versionEndExcluding: "3.0.13",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9318762-F84D-4012-A969-BAD7E7D7BC66",
                     versionEndExcluding: "3.1.7",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ACFC73-A509-4D1C-8FC3-F68F495AB055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7B49D71-6A31-497A-B6A9-06E84F086E7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B095CC03-7077-4A58-AB25-CC5380CDCE5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "18096778-19E1-434F-BD96-A9FBF11A8C81",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
      },
      {
         lang: "es",
         value: "El paquete python/cpython desde versiones 0 y anteriores a 3.6.13, desde versiones 3.7.0 y anteriores a 3.7.10, desde versiones 3.8.0 y anteriores a 3.8.8, desde versiones 3.9.0 y anteriores a 3.9.2, son vulnerables al envenenamiento de caché web por medio de urllib.parse.parse_qsl y urllib.parse.parse_qs usando un vector llamado encubrimiento de parámetros.&#xa0;Cuando el atacante puede separar los parámetros de la consulta usando un punto y coma (;), pueden causar una diferencia en la interpretación de la petición entre el proxy (que se ejecuta con la configuración predeterminada) y el servidor.&#xa0;Esto puede resultar en que las peticiones maliciosas se almacenen en caché como completamente seguras, ya que el proxy normalmente no vería el punto y coma como un separador y, por lo tanto, no lo incluiría en una clave de caché de un parámetro sin clave",
      },
   ],
   id: "CVE-2021-23336",
   lastModified: "2024-11-21T05:51:31.403",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:H/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.6,
            impactScore: 4.2,
            source: "report@snyk.io",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.6,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-02-15T13:15:12.433",
   references: [
      {
         source: "report@snyk.io",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/02/19/4",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/01/2",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/python/cpython/pull/24297",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
      },
      {
         source: "report@snyk.io",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202104-04",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210326-0004/",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "report@snyk.io",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/02/19/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/01/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/python/cpython/pull/24297",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202104-04",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210326-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "report@snyk.io",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-444",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-08-02 15:15
Modified
2024-11-21 04:26
Summary
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
cve@mitre.orghttps://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Aug/15
cve@mitre.orghttps://security.gentoo.org/glsa/202004-17
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190828-0002/
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4498
cve@mitre.orghttps://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/dev/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/15
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202004-17
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190828-0002/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4498
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2019/aug/01/security-releases/Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F49BD116-09A6-454E-BB68-65FCDE06DF33",
                     versionEndExcluding: "1.11.23",
                     versionStartIncluding: "1.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D05096B-F60E-4DB2-AE59-EED55F945AB0",
                     versionEndExcluding: "2.1.11",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B",
                     versionEndExcluding: "2.2.4",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.",
      },
      {
         lang: "es",
         value: "Se detectó un problema en Django versiones 1.11.x anteriores a 1.11.23, versiones 2.1.x anteriores a  2.1.11 y versiones 2.2.x anteriores a 2.2.4. Debido al comportamiento del HTMLParser subyacente, django.utils.html.strip_tags sería extremadamente lento para evaluar ciertas entradas que contienen secuencias largas de entidades HTML incompletas anidadas.",
      },
   ],
   id: "CVE-2019-14233",
   lastModified: "2024-11-21T04:26:15.367",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-08-02T15:15:11.943",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/dev/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://seclists.org/bugtraq/2019/Aug/15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/202004-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20190828-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.debian.org/security/2019/dsa-4498",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-08 18:15
Modified
2024-11-21 06:09
Summary
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
References
cve@mitre.orghttps://docs.djangoproject.com/en/3.2/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
cve@mitre.orghttps://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
cve@mitre.orghttps://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
cve@mitre.orghttps://groups.google.com/g/django-announce/c/sPyjSKMi8EoMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20210727-0004/Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2021/jun/02/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/3.2/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
af854a3a-2127-422b-91ae-364da2661108https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/g/django-announce/c/sPyjSKMi8EoMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20210727-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2021/jun/02/security-releases/Patch, Vendor Advisory
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD5CCAE9-4A03-4C54-9278-BBA06A1C9ECF",
                     versionEndExcluding: "2.2.24",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0895A526-5861-47FC-91AC-8F78387E464A",
                     versionEndExcluding: "3.1.12",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FACCFD9B-3783-4065-8F52-686D20149AAF",
                     versionEndExcluding: "3.2.4",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .",
      },
      {
         lang: "es",
         value: "En Django versiones 2.2 anteriores a 2.2.24, versiones 3.x anteriores a 3.1.12 y versiones 3.2 anteriores a 3.2.4, las funciones URLValidator, validate_ipv4_address y validate_ipv46_address no prohíben los caracteres cero a la izquierda en los literales octales. Esto puede permitir una omisión del control de acceso basado en las direcciones IP. (validate_ipv4_address y validate_ipv46_address no se ven afectados con Python versión 3.9.5+)",
      },
   ],
   id: "CVE-2021-33571",
   lastModified: "2024-11-21T06:09:06.823",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-08T18:15:08.517",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d",
      },
      {
         source: "cve@mitre.org",
         url: "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210727-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/jun/02/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-918",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-12-08 00:15
Modified
2024-11-21 06:30
Summary
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7C337EB-B7FF-4216-912B-26FB003D8667",
                     versionEndExcluding: "2.2.25",
                     versionStartIncluding: "2.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2071B42-6E34-494E-B49F-72058E5C8AC0",
                     versionEndExcluding: "3.1.14",
                     versionStartIncluding: "3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C67D250D-03D7-40AA-9DFD-E86F5167057F",
                     versionEndExcluding: "3.2.10",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:satellite:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "500C9E01-3373-43EA-AA9B-862B0DD87C6D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EF1C1CC-3FAE-4DE3-BC41-E5B14D5721F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.",
      },
      {
         lang: "es",
         value: "En Django versiones 2.2 anteriores a 2.2.25, versiones 3.1 anteriores a 3.1.14, y versiones 3.2 anteriores a 3.2.10, las peticiones HTTP para URLs con líneas nuevas al final podían omitir el control de acceso de la corriente principal basado en las rutas de las URLs",
      },
   ],
   id: "CVE-2021-44420",
   lastModified: "2024-11-21T06:30:56.037",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-12-08T00:15:07.757",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20211229-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2021/12/07/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/3.2/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20211229-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2021/dec/07/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2021/12/07/1",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-08-26 14:55
Modified
2024-11-21 02:02
Severity ?
Summary
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BB1EF6D7-0AF4-4146-BA37-961F7048C1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5E4CCE84-425C-4B9C-98B7-D858B64B3418",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "B6B77FCE-F26A-41CB-8D72-E9EF0E352288",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "985884FE-AEB9-4D93-806E-ADFCC576FF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D81EE1B4-9CB4-4776-A7CE-44B023C67CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "81798B3D-A000-40D5-A369-C9A0BEF79A5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "29477EEA-D5F8-45A9-9777-8A6BC7C668A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "A83451BD-1D67-4A7F-A62C-F597E51FCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0300DC0D-5DD0-42B5-9FE0-54DC557EA40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85A2021F-B2AF-40DC-9FA2-5F90D2EB813E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "07B12D68-BB49-4931-9D9E-D8134FC0B350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CC369A0-0092-450D-91E9-13C7AF7EBC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6B7974-ABEF-4E0C-8503-6E9C22D28C78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55460F1D-661B-465C-8A22-E4E6DA2834B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FD4FB46-3A98-4B9B-A241-C39E2C2A0FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF87FDAB-51A2-41C4-A4C4-5180B0230C3F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDB4B76-6541-4405-B74C-3EEAF84A04E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8A26B113-8D22-46E5-92C3-12134A68A21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0D99FB28-08F3-45B4-8C04-90074FBC2457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2A29CC-A92B-4EC1-8225-408A5048C033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "73317E26-AA3A-4437-9261-CE76BC1A0749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6046CEB-6CF5-406F-BF6B-4D8C24DDA6FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A666B9E5-EA1B-4FA9-A685-61ECF26CB084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB3FED4-C50A-4449-9A7B-552CFB02F860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4F3D5C-5768-48F1-8A39-1B87EC061F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10E08DF-6B92-452A-876B-DC8D376B0B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFC18F77-77CB-45CB-869E-267DACD19601",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA690BD-2FBA-425B-AC6F-046081E21183",
                     versionEndIncluding: "1.4.13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "13EF02D4-406C-4146-9B8F-FAC906E7B6E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC462CE5-1BE0-41E0-A28D-291350F021AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4166ADA9-D5B4-47D6-BD93-C98841108275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "080D43D0-C0FF-4F89-910C-D466943816C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E04AE832-9059-42AB-AD39-D01E7A633615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "693EEF6B-810B-4684-9AB5-1BDC95DFA4CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EF4268-0DB7-4150-B8E7-53C6D7F02E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C571F85F-9F49-48B6-9AD9-16CD81655F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41F0F1FA-E3EC-421C-9F72-11FC857F6F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4031E5F-B5D6-4E7D-96FC-A4ACF9C306A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1577DD-B40E-404B-8E55-3A93AB8A8F62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.",
      },
      {
         lang: "es",
         value: "La función core.urlresolvers.reverse en Django anterior a 1.4.14, 1.5.x anterior a 1.5.9, 1.6.x anterior a 1.6.6, y 1.7 anterior a release candidate 3 no valida debidamente las URLs, lo que permite a atacantes remotos realizar ataques de phishing a través de un // (barra barra) en una URL, lo que provoca que se genere una URL relacionada con esquemas.",
      },
   ],
   id: "CVE-2014-0480",
   lastModified: "2024-11-21T02:02:13.383",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2014-08-26T14:55:05.190",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "security@debian.org",
         url: "http://www.securityfocus.com/bid/69425",
      },
      {
         source: "security@debian.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/59782",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61276",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2014/dsa-3010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/69425",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2014/aug/20/security/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-04 16:15
Modified
2024-11-21 07:09
Severity ?
Summary
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
References
cve@mitre.orghttps://docs.djangoproject.com/en/4.0/releases/security/Patch, Vendor Advisory
cve@mitre.orghttps://groups.google.com/forum/#%21forum/django-announce
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20220818-0006/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2022/dsa-5254Third Party Advisory
cve@mitre.orghttps://www.djangoproject.com/weblog/2022/jul/04/security-releases/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.djangoproject.com/en/4.0/releases/security/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21forum/django-announce
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20220818-0006/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5254Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.djangoproject.com/weblog/2022/jul/04/security-releases/Patch, Vendor Advisory
Impacted products
Vendor Product Version
djangoproject django *
djangoproject django *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8994946A-B3AF-430F-A916-AF1B127897AB",
                     versionEndExcluding: "3.2.14",
                     versionStartIncluding: "3.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "843DA6AD-07C5-4494-B43B-0BB646AFC809",
                     versionEndExcluding: "4.0.6",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.",
      },
      {
         lang: "es",
         value: "Se ha detectado un problema en Django versiones 3.2 anteriores a 3.2.14 y 4.0 anteriores a 4.0.6. Las funciones de base de datos Trunc() y Extract() están sujetas a inyección SQL si son usados datos no confiables como valor de kind/lookup_name. Las aplicaciones que restringen el nombre de búsqueda y la elección del tipo a una lista segura conocida no están afectadas",
      },
   ],
   id: "CVE-2022-34265",
   lastModified: "2024-11-21T07:09:10.777",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-07-04T16:15:09.260",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "cve@mitre.org",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220818-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.djangoproject.com/en/4.0/releases/security/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://groups.google.com/forum/#%21forum/django-announce",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220818-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2022/dsa-5254",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.djangoproject.com/weblog/2022/jul/04/security-releases/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-02-08 19:59
Modified
2024-11-21 02:47
Summary
Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the "Save as New" option when editing objects and leveraging the "change" permission.
Impacted products
Vendor Product Version
djangoproject django 1.9
djangoproject django 1.9.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C40BAC-6DF3-4EA2-A65A-86462DDD8723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B754401-8503-4553-853F-4F6BCD2D2FF2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenticated users to bypass intended access restrictions and create ModelAdmin objects via the \"Save as New\" option when editing objects and leveraging the \"change\" permission.",
      },
      {
         lang: "es",
         value: "Django 1.9.x en versiones anteriores a 1.9.2, cuando ModelAdmin.save_as se establece a verdadero, permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso y crear objetos ModelAdmin a través de la opción \"Save as New\" cuando se editan objetos y se aprovecha el permiso \"change\".",
      },
   ],
   id: "CVE-2016-2048",
   lastModified: "2024-11-21T02:47:41.407",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-02-08T19:59:05.470",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/82329",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1034894",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/82329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1034894",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.djangoproject.com/weblog/2016/feb/01/releases-192-and-189/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}