Improper Input Validation Affecting python-django package, versions <1.4.2-1
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.67% (80th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-PYTHONDJANGO-360903
- published 18 Nov 2012
- disclosed 18 Nov 2012
Introduced: 18 Nov 2012
CVE-2012-4520 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
python-django
to version 1.4.2-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-django
package and not the python-django
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
References
- https://security-tracker.debian.org/tracker/CVE-2012-4520
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
- http://www.debian.org/security/2013/dsa-2634
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
- https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
- https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
- https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
- http://securitytracker.com/id?1027708
- https://www.djangoproject.com/weblog/2012/oct/17/security/
- http://ubuntu.com/usn/usn-1632-1
- http://ubuntu.com/usn/usn-1757-1
- http://www.openwall.com/lists/oss-security/2012/10/30/4
- https://bugzilla.redhat.com/show_bug.cgi?id=865164
- http://secunia.com/advisories/51033
- http://secunia.com/advisories/51314
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-4520
- http://www.osvdb.org/86493