CVE-2015-0219: Django WSGI Header Spoofing Vulnerability
(updated )
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _
(underscore) character instead of a -
(dash) character in an HTTP header, as demonstrated by an X-Auth_User
header.
References
- github.com/advisories/GHSA-7qfw-j7hp-v45g
- github.com/django/daphne/blob/e49c39a4e5fac8ec170dd653641a9e90844fd3f1/daphne/http_protocol.py
- github.com/django/django
- github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f
- github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450
- github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-4.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-0219
- web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
- web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
- web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
- web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
- web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
- www.djangoproject.com/weblog/2015/jan/13/security
Detect and mitigate CVE-2015-0219 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →