CVE-2015-0219: Django WSGI Header Spoofing Vulnerability
(updated )
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
References
- advisories.mageia.org/MGASA-2015-0026.html
- lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
- lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- www.ubuntu.com/usn/USN-2469-1
- github.com/advisories/GHSA-7qfw-j7hp-v45g
- github.com/django/daphne/blob/e49c39a4e5fac8ec170dd653641a9e90844fd3f1/daphne/http_protocol.py
- github.com/django/django/commit/41b4bc73ee0da7b2e09f4af47fc1fd21144c710f
- github.com/django/django/commit/4f6fffc1dc429f1ad428ecf8e6620739e8837450
- github.com/django/django/commit/d7597b31d5c03106eeba4be14a33b32a5e25f4ee
- nvd.nist.gov/vuln/detail/CVE-2015-0219
- web.archive.org/web/20150128111656/http://secunia.com/advisories/62285
- web.archive.org/web/20150128111656/http://secunia.com/advisories/62309
- web.archive.org/web/20150523054951/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:109/?name=MDVSA-2015:109
- web.archive.org/web/20150523054953/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:036/?name=MDVSA-2015:036
- web.archive.org/web/20151104201446/http://secunia.com/advisories/62718
- www.djangoproject.com/weblog/2015/jan/13/security/
Detect and mitigate CVE-2015-0219 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →