Vulnerability Name:

CVE-2015-0220

Assigned:2014-11-18
Published:2015-01-16
Updated:2016-12-21
Summary:The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
CVSS v3 Severity:3.7 Low (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
References:Source: CONFIRM
Type: UNKNOWN
http://advisories.mageia.org/MGASA-2015-0026.html

Source: FEDORA
Type: UNKNOWN
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html

Source: FEDORA
Type: UNKNOWN
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html

Source: SUSE
Type: UNKNOWN
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html

Source: SUSE
Type: UNKNOWN
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html

Source: UBUNTU
Type: UNKNOWN
http://ubuntu.com/usn/usn-2469-1

Source: MANDRIVA
Type: UNKNOWN
http://www.mandriva.com/security/advisories?name=MDVSA-2015:036

Source: MANDRIVA
Type: UNKNOWN
http://www.mandriva.com/security/advisories?name=MDVSA-2015:109

Source: CONFIRM
Type: VENDOR_ADVISORY
https://www.djangoproject.com/weblog/2015/jan/13/security/

Vulnerable Configuration:Configuration 1:
  • cpe:/o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:12.04::lts:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:10.04::lts:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:djangoproject:django:1.4.17:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.8:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.6.9:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.7:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:djangoproject:django:1.7.2:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20150220
    V
    CVE-2015-0220
    2017-03-01
    oval:org.cisecurity:def:129
    P
    DSA-3151-1 -- python-django -- security update
    2016-02-08
    oval:com.ubuntu.precise:def:20150220000
    V
    CVE-2015-0220 on Ubuntu 12.04 LTS (precise) - medium.
    2015-01-16
    oval:com.ubuntu.trusty:def:20150220000
    V
    CVE-2015-0220 on Ubuntu 14.04 LTS (trusty) - medium.
    2015-01-16
    BACK
    canonical ubuntu_linux 14.10
    canonical ubuntu_linux 14.04
    canonical ubuntu_linux 12.04
    canonical ubuntu_linux 10.04
    djangoproject django 1.4.17
    djangoproject django 1.6
    djangoproject django 1.6.1
    djangoproject django 1.6.2
    djangoproject django 1.6.3
    djangoproject django 1.6.4
    djangoproject django 1.6.5
    djangoproject django 1.6.6
    djangoproject django 1.6.7
    djangoproject django 1.6.8
    djangoproject django 1.6.9
    djangoproject django 1.7
    djangoproject django 1.7.1
    djangoproject django 1.7.2