CVE-2016-9014: Django DNS Rebinding Vulnerability
(updated )
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
References
- github.com/advisories/GHSA-3f2c-jm6v-cr35
- github.com/django/django
- github.com/django/django/commit/45acd6d836895a4c36575f48b3fb36a3dae98d19
- github.com/django/django/commit/884e113838e5a72b4b0ec9e5e87aa480f6aa4472
- github.com/django/django/commit/c401ae9a7dfb1a94a8a61927ed541d6f93089587
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-18.yaml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S
- nvd.nist.gov/vuln/detail/CVE-2016-9014
- web.archive.org/web/20210123185619/http://www.securityfocus.com/bid/94068
- web.archive.org/web/20211204043252/http://www.securitytracker.com/id/1037159
- www.djangoproject.com/weblog/2016/nov/01/security-releases
Detect and mitigate CVE-2016-9014 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →