CVE-2012-4520

The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
http://secunia.com/advisories/51033 Vendor Advisory
http://secunia.com/advisories/51314 Vendor Advisory
http://securitytracker.com/id?1027708
http://ubuntu.com/usn/usn-1632-1
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2012/10/30/4
http://www.osvdb.org/86493
https://bugzilla.redhat.com/show_bug.cgi?id=865164
https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
https://www.djangoproject.com/weblog/2012/oct/17/security/ Patch Vendor Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
http://secunia.com/advisories/51033 Vendor Advisory
http://secunia.com/advisories/51314 Vendor Advisory
http://securitytracker.com/id?1027708
http://ubuntu.com/usn/usn-1632-1
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2012/10/30/4
http://www.osvdb.org/86493
https://bugzilla.redhat.com/show_bug.cgi?id=865164
https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
https://www.djangoproject.com/weblog/2012/oct/17/security/ Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html -
References () http://secunia.com/advisories/51033 - Vendor Advisory () http://secunia.com/advisories/51033 - Vendor Advisory
References () http://secunia.com/advisories/51314 - Vendor Advisory () http://secunia.com/advisories/51314 - Vendor Advisory
References () http://securitytracker.com/id?1027708 - () http://securitytracker.com/id?1027708 -
References () http://ubuntu.com/usn/usn-1632-1 - () http://ubuntu.com/usn/usn-1632-1 -
References () http://ubuntu.com/usn/usn-1757-1 - () http://ubuntu.com/usn/usn-1757-1 -
References () http://www.debian.org/security/2013/dsa-2634 - () http://www.debian.org/security/2013/dsa-2634 -
References () http://www.openwall.com/lists/oss-security/2012/10/30/4 - () http://www.openwall.com/lists/oss-security/2012/10/30/4 -
References () http://www.osvdb.org/86493 - () http://www.osvdb.org/86493 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=865164 - () https://bugzilla.redhat.com/show_bug.cgi?id=865164 -
References () https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3 - () https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3 -
References () https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e - () https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e -
References () https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071 - () https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071 -
References () https://www.djangoproject.com/weblog/2012/oct/17/security/ - Patch, Vendor Advisory () https://www.djangoproject.com/weblog/2012/oct/17/security/ - Patch, Vendor Advisory

Information

Published : 2012-11-18 23:55

Updated : 2024-11-21 01:43


NVD link : CVE-2012-4520

Mitre link : CVE-2012-4520

CVE.ORG link : CVE-2012-4520


JSON object : View

Products Affected

djangoproject

  • django
CWE
CWE-20

Improper Input Validation