CVE-2017-7233
Publication date 4 April 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
python-django | ||
16.04 LTS xenial |
Fixed 1.8.7-1ubuntu5.5
|
|
14.04 LTS trusty |
Fixed 1.6.11-0ubuntu1.1
|
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3254-1
- Django vulnerabilities
- 4 April 2017