An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1814-1 python-django security update
Debian DLA Debian DLA DLA-1842-1 python-django security update
Debian DSA Debian DSA DSA-4476-1 python-django security update
EUVD EUVD EUVD-2019-0043 An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
Github GHSA Github GHSA GHSA-7rp2-fm2h-wchj Django Cross-site Scripting in AdminURLFieldWidget
Ubuntu USN Ubuntu USN USN-4043-1 Django vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:17:39.619Z

Reserved: 2019-05-23T00:00:00

Link: CVE-2019-12308

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-03T17:29:01.213

Modified: 2024-11-21T04:22:35.753

Link: CVE-2019-12308

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-06-03T00:00:00Z

Links: CVE-2019-12308 - Bugzilla

cve-icon OpenCVE Enrichment

No data.