The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145 - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html - | |
References | () http://secunia.com/advisories/51033 - Vendor Advisory | |
References | () http://secunia.com/advisories/51314 - Vendor Advisory | |
References | () http://securitytracker.com/id?1027708 - | |
References | () http://ubuntu.com/usn/usn-1632-1 - | |
References | () http://ubuntu.com/usn/usn-1757-1 - | |
References | () http://www.debian.org/security/2013/dsa-2634 - | |
References | () http://www.openwall.com/lists/oss-security/2012/10/30/4 - | |
References | () http://www.osvdb.org/86493 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=865164 - | |
References | () https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3 - | |
References | () https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e - | |
References | () https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071 - | |
References | () https://www.djangoproject.com/weblog/2012/oct/17/security/ - Patch, Vendor Advisory |
Information
Published : 2012-11-18 23:55
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4520
Mitre link : CVE-2012-4520
CVE.ORG link : CVE-2012-4520
JSON object : View
Products Affected
djangoproject
- django
CWE
CWE-20
Improper Input Validation