HTTP Response Splitting Affecting django package, versions [,1.4.21) [1.5,1.7.9) [1.8,1.8.3)
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.61% (79th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-DJANGO-40333
- published 8 Jul 2015
- disclosed 8 Jul 2015
- credit Unknown
Introduced: 8 Jul 2015
CVE-2015-5144 Open this link in a new tabOverview
django
is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.
Affected versions of this package are vulnerable to HTTP Response Splitting attacks due to the use of an incorrect regular expression. It allows newline characters in email messages (to the EmailValidator
), in URLs (to the URLValidator
), or other instances. An attacker can leverage this to inject arbitrary headers and conduct HTTP response splitting attacks.