CVE-2014-3730: Django Allows Open Redirects
(updated )
The django.util.http.is_safe_url
function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by “http:\\djangoproject.com.”
References
- github.com/advisories/GHSA-vq3h-3q7v-9prw
- github.com/django/django
- github.com/django/django/commit/601107524523bca02376a0ddc1a06c6fdb8f22f3
- github.com/django/django/commit/7feb54bbae3f637ab3c4dd4831d4385964f574df
- github.com/django/django/commit/ad32c218850ad40972dcef57beb460f8c979dd6d
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-20.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-3730
- web.archive.org/web/20200228171223/http://www.securityfocus.com/bid/67410
- www.djangoproject.com/weblog/2014/may/14/security-releases-issued
Detect and mitigate CVE-2014-3730 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →