The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-272-1 | python-django security update |
Debian DSA |
DSA-3204-1 | python-django security update |
EUVD |
EUVD-2015-0018 | The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \\x08javascript: URL. |
Github GHSA |
GHSA-7fq8-4pv5-5w5c | Django cross-site scripting (XSS) attack via user-supplied redirect URLs |
Ubuntu USN |
USN-2539-1 | Django vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T05:10:16.267Z
Reserved: 2015-03-17T00:00:00
Link: CVE-2015-2317
No data.
Status : Deferred
Published: 2015-03-25T14:59:04.377
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-2317
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN