CVE-2012-3442: Django Allows Redirect via Data URL
(updated )
The (1) django.http.HttpResponseRedirect
and (2) django.http.HttpResponsePermanentRedirect
classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data:
URL.
References
- github.com/advisories/GHSA-78vx-ggch-wghm
- github.com/django/django
- github.com/django/django/commit/4dea4883e6c50d75f215a6b9bcbd95273f57c72d
- github.com/django/django/commit/e34685034b60be1112160e76091e5aee60149fa1
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-2.yaml
- nvd.nist.gov/vuln/detail/CVE-2012-3442
- www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
Detect and mitigate CVE-2012-3442 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →