The django.util.http.is_safe_url
function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by “http:\\djangoproject.com.”
lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
ubuntu.com/usn/usn-2212-1
www.debian.org/security/2014/dsa-2934
www.openwall.com/lists/oss-security/2014/05/14/10
www.openwall.com/lists/oss-security/2014/05/15/3
github.com/django/django/commit/601107524523bca02376a0ddc1a06c6fdb8f22f3
github.com/django/django/commit/7feb54bbae3f637ab3c4dd4831d4385964f574df
github.com/django/django/commit/ad32c218850ad40972dcef57beb460f8c979dd6d
nvd.nist.gov/vuln/detail/CVE-2014-3730
web.archive.org/web/20200228171223/www.securityfocus.com/bid/67410
www.djangoproject.com/weblog/2014/may/14/security-releases-issued