CVE-2014-0472: Code Injection in Django
(updated )
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a “dotted Python path.”
References
- github.com/advisories/GHSA-rvq6-mrpv-m6rm
- github.com/django/django
- github.com/django/django/commit/2a5bcb69f42b84464b24b5c835dca6467b6aa7f1
- github.com/django/django/commit/4352a50871e239ebcdf64eee6f0b88e714015c1b
- github.com/django/django/commit/c1a8c420fe4b27fb2caf5e46d23b5712fc0ac535
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-1.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-0472
- www.djangoproject.com/weblog/2014/apr/21/security
Detect and mitigate CVE-2014-0472 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →