Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-885-1 python-django security update
Debian DSA Debian DSA DSA-3835-1 python-django security update
EUVD EUVD EUVD-2017-0026 Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an \"on success\" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs \"safe\" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
Github GHSA Github GHSA GHSA-37hp-765x-j95x Django open redirect and possible XSS attack via user-supplied numeric redirect URLs
Ubuntu USN Ubuntu USN USN-3254-1 Django vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T15:56:36.158Z

Reserved: 2017-03-22T00:00:00

Link: CVE-2017-7233

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-04-04T17:59:00.273

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-7233

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-04-04T00:00:00Z

Links: CVE-2017-7233 - Bugzilla

cve-icon OpenCVE Enrichment

No data.