CVE-2016-9014
Publication date 1 November 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
Status
Package | Ubuntu Release | Status |
---|---|---|
python-django | ||
16.04 LTS xenial |
Fixed 1.8.7-1ubuntu5.4
|
|
14.04 LTS trusty |
Fixed 1.6.1-2ubuntu0.16
|
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3115-1
- Django vulnerabilities
- 1 November 2016