CVE-2014-0480: Django Incorrectly Validates URLs
(updated )
The core.urlresolvers.reverse
function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a //
(slash slash) in a URL, which triggers a scheme-relative URL to be generated.
References
- github.com/advisories/GHSA-f7cm-ccfp-3q4r
- github.com/django/django
- github.com/django/django/commit/45ac9d4fb087d21902469fc22643f5201d41a0cd
- github.com/django/django/commit/c2fe73133b62a1d9e8f7a6b43966570b14618d7e
- github.com/django/django/commit/da051da8df5e69944745072611351d4cfc6435d5
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-4.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-0480
- web.archive.org/web/20140918034351/http://www.securityfocus.com/bid/69425
- www.djangoproject.com/weblog/2014/aug/20/security
Detect and mitigate CVE-2014-0480 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →