The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
CPE | Name | Operator | Version |
---|---|---|---|
pypi/django | lt | 1.4.14 | |
pypi/django | ge | 1.5.0 | |
pypi/django | lt | 1.5.9 | |
pypi/django | ge | 1.6.0 | |
pypi/django | lt | 1.6.6 |
lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
www.debian.org/security/2014/dsa-3010
github.com/advisories/GHSA-f7cm-ccfp-3q4r
github.com/django/django/commit/45ac9d4fb087d21902469fc22643f5201d41a0cd
github.com/django/django/commit/c2fe73133b62a1d9e8f7a6b43966570b14618d7e
github.com/django/django/commit/da051da8df5e69944745072611351d4cfc6435d5
nvd.nist.gov/vuln/detail/CVE-2014-0480
web.archive.org/web/20140918034351/www.securityfocus.com/bid/69425
www.djangoproject.com/weblog/2014/aug/20/security/