CVE-2014-0483: Django data leakage via querystring manipulation in admin
(updated )
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&t=password
URI.
References
- github.com/advisories/GHSA-rw75-m7gp-92m3
- github.com/django/django
- github.com/django/django/commit/027bd348642007617518379f8b02546abacaa6e0
- github.com/django/django/commit/2a446c896e7c814661fb9c4f212b071b2a7fa446
- github.com/django/django/commit/2b31342cdf14fc20e07c43d258f1e7334ad664a6
- github.com/django/django/commit/f7c494f2506250b8cb5923714360a3642ed63e0f
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-7.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-0483
- web.archive.org/web/20151016194735/http://secunia.com/advisories/61276
- web.archive.org/web/20151016202523/http://secunia.com/advisories/59782
- web.archive.org/web/20151023143840/http://secunia.com/advisories/61281
- www.djangoproject.com/weblog/2014/aug/20/security
Detect and mitigate CVE-2014-0483 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →