Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3835 | |
http://www.securityfocus.com/bid/94068 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037159 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-3115-1 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/ | |
https://www.djangoproject.com/weblog/2016/nov/01/security-releases/ | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 02:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-12-09 20:59
Updated : 2024-02-28 15:44
NVD link : CVE-2016-9014
Mitre link : CVE-2016-9014
CVE.ORG link : CVE-2016-9014
JSON object : View
Products Affected
fedoraproject
- fedora
canonical
- ubuntu_linux
djangoproject
- django
CWE
CWE-264
Permissions, Privileges, and Access Controls