Lucene search

K
nvd[email protected]NVD:CVE-2015-5144
HistoryJul 14, 2015 - 5:59 p.m.

CVE-2015-5144

2015-07-1417:59:07
CWE-20
web.nvd.nist.gov
1

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.9

Confidence

High

EPSS

0.006

Percentile

78.8%

Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.

Affected configurations

NVD
Node
canonicalubuntu_linuxMatch12.04lts
OR
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch15.04
OR
canonicalubuntu_linuxMatch15.10
Node
djangoprojectdjangoRange1.4.20
OR
djangoprojectdjangoMatch1.5
OR
djangoprojectdjangoMatch1.5alpha
OR
djangoprojectdjangoMatch1.5beta
OR
djangoprojectdjangoMatch1.5.1
OR
djangoprojectdjangoMatch1.5.2
OR
djangoprojectdjangoMatch1.5.3
OR
djangoprojectdjangoMatch1.5.4
OR
djangoprojectdjangoMatch1.5.5
OR
djangoprojectdjangoMatch1.5.6
OR
djangoprojectdjangoMatch1.5.7
OR
djangoprojectdjangoMatch1.5.8
OR
djangoprojectdjangoMatch1.5.9
OR
djangoprojectdjangoMatch1.5.10
OR
djangoprojectdjangoMatch1.5.11
OR
djangoprojectdjangoMatch1.5.12
OR
djangoprojectdjangoMatch1.6-
OR
djangoprojectdjangoMatch1.6beta1
OR
djangoprojectdjangoMatch1.6beta2
OR
djangoprojectdjangoMatch1.6beta3
OR
djangoprojectdjangoMatch1.6beta4
OR
djangoprojectdjangoMatch1.6.1
OR
djangoprojectdjangoMatch1.6.2
OR
djangoprojectdjangoMatch1.6.3
OR
djangoprojectdjangoMatch1.6.4
OR
djangoprojectdjangoMatch1.6.5
OR
djangoprojectdjangoMatch1.6.6
OR
djangoprojectdjangoMatch1.6.7
OR
djangoprojectdjangoMatch1.6.8
OR
djangoprojectdjangoMatch1.6.9
OR
djangoprojectdjangoMatch1.6.10
OR
djangoprojectdjangoMatch1.7beta1
OR
djangoprojectdjangoMatch1.7beta2
OR
djangoprojectdjangoMatch1.7beta3
OR
djangoprojectdjangoMatch1.7beta4
OR
djangoprojectdjangoMatch1.7rc1
OR
djangoprojectdjangoMatch1.7rc2
OR
djangoprojectdjangoMatch1.7rc3
OR
djangoprojectdjangoMatch1.7.1
OR
djangoprojectdjangoMatch1.7.2
OR
djangoprojectdjangoMatch1.7.3
OR
djangoprojectdjangoMatch1.7.4
OR
djangoprojectdjangoMatch1.7.5
OR
djangoprojectdjangoMatch1.7.6
OR
djangoprojectdjangoMatch1.7.7
OR
djangoprojectdjangoMatch1.7.8
OR
djangoprojectdjangoMatch1.7.9
OR
djangoprojectdjangoMatch1.8beta1
OR
djangoprojectdjangoMatch1.8.0
OR
djangoprojectdjangoMatch1.8.1
OR
djangoprojectdjangoMatch1.8.2
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
Node
oraclesolarisMatch11.3

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.9

Confidence

High

EPSS

0.006

Percentile

78.8%