CVE-2015-5144: Header injection via multi-lines input
(updated )
Some built-in validators (django.core.validators.EmailValidator, most seriously) don’t prohibit newline characters (due to the usage of $ instead of \Z in the regular expressions). If you use values with newlines in HTTP response or email headers, you can suffer from header injection attacks.
References
Detect and mitigate CVE-2015-5144 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →