Arbitrary Request Generation Affecting django package, versions [,1.2.7)[1.3,1.3.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.74% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Request Generation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-DJANGO-40082
  • published11 Sept 2011
  • disclosed11 Sept 2011
  • creditPaul McMillan

Introduced: 11 Sep 2011

CVE-2011-4138  (opens in a new tab)
CWE-20  (opens in a new tab)

Overview

django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable due to lack of request validation. The verify_exists functionality in the URLField originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect. This may allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.

CVSS Scores

version 3.1