CVE-2016-2512 — Cross-site Scripting in Django
Severity
7.4HIGHNVD
EPSS
1.2%
top 21.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
Latest updateMay 17
Description
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:NExploitability: 2.8 | Impact: 4.0
Affected Packages2 packages
🔴Vulnerability Details
6📋Vendor Advisories
4💬Community
5Bugzilla▶
CVE-2016-2512 python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth [fedora-all]↗2016-03-03
Bugzilla▶
CVE-2016-2512 python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth [epel-7]↗2016-03-03
Bugzilla▶
CVE-2016-2512 django14: python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth [epel-6]↗2016-03-03
Bugzilla▶
CVE-2016-2512 python-django15: python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth [epel-6]↗2016-03-03
Bugzilla▶
CVE-2016-2512 python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth↗2016-02-24