The django.util.http.is_safe_url
function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a \njavascript:
URL.
advisories.mageia.org/MGASA-2015-0026.html
lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
ubuntu.com/usn/usn-2469-1
github.com/django/django/blob/4555a823fd57e261e1b19c778429473256c8ea08/docs/releases/1.4.18.txt#L34-L46
github.com/django/django/commit/4c241f1b710da6419d9dca160e80b23b82db7758
github.com/django/django/commit/72e0b033662faa11bb7f516f18a132728aa0ae28
github.com/django/django/commit/de67dedc771ad2edec15c1d00c083a1a084e1e89
nvd.nist.gov/vuln/detail/CVE-2015-0220
web.archive.org/web/20150128111656/secunia.com/advisories/62285
web.archive.org/web/20150523054951/www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
web.archive.org/web/20150523054953/www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
web.archive.org/web/20151104201446/secunia.com/advisories/62718
www.djangoproject.com/weblog/2015/jan/13/security