CVE-2015-2317 — Cross-site Scripting in Django
Severity
4.3MEDIUMNVD
OSV5.0
EPSS
4.3%
top 11.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Latest updateMay 14
Description
The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
CVSS vector
AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9
Affected Packages4 packages
Also affects: Debian Linux 7.0, Fedora 22, Ubuntu Linux 10.04, 12.04, 14.04, 14.10
🔴Vulnerability Details
5📋Vendor Advisories
3💬Community
5Bugzilla▶
CVE-2015-2317 python-django14: Django: possible XSS attack via user-supplied redirect URLs [fedora-20]↗2015-03-19
Bugzilla▶
CVE-2015-2317 python-django: Django: possible XSS attack via user-supplied redirect URLs [epel-7]↗2015-03-19
Bugzilla▶
CVE-2015-2317 python-django: Django: possible XSS attack via user-supplied redirect URLs [fedora-all]↗2015-03-19
Bugzilla▶
CVE-2015-2317 Django14: Django: possible XSS attack via user-supplied redirect URLs [epel-6]↗2015-03-19