CVE-2016-2512: Django XSS Vulnerability
(updated )
The utils.http.is_safe_url function
in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com
.
References
- github.com/advisories/GHSA-pw27-w7w4-9qc7
- github.com/django/django
- github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350
- github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
- github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-15.yaml
- nvd.nist.gov/vuln/detail/CVE-2016-2512
- web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879
- web.archive.org/web/20210413200202/http://www.securitytracker.com/id/1035152
- www.djangoproject.com/weblog/2016/mar/01/security-releases
Detect and mitigate CVE-2016-2512 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →