CVE-2015-5144: Django Vulnerable to HTTP Response Splitting Attack
(updated )
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
References
- github.com/advisories/GHSA-q5qw-4364-5hhm
- github.com/django/django
- github.com/django/django/blob/4555a823fd57e261e1b19c778429473256c8ea08/docs/releases/1.4.21.txt
- github.com/django/django/commit/1ba1cdce7d58e6740fe51955d945b56ae51d072a
- github.com/django/django/commit/574dd5e0b0fbb877ae5827b1603d298edc9bb2a0
- github.com/django/django/commit/8f9a4d3a2bc42f14bb437defd30c7315adbff22c
- github.com/django/django/commit/ae49b4d994656bc037513dcd064cb9ce5bb85649
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-10.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-5144
- security.gentoo.org/glsa/201510-06
- web.archive.org/web/20150924150801/http://www.securitytracker.com/id/1032820
- web.archive.org/web/20200228050526/http://www.securityfocus.com/bid/75665
- www.djangoproject.com/weblog/2015/jul/08/security-releases
Detect and mitigate CVE-2015-5144 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →