First published: Tue Jul 31 2012(Updated: )
The (1) `django.http.HttpResponseRedirect` and (2) `django.http.HttpResponsePermanentRedirect` classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a `data:` URL.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-django | <=1.4-1<=1.2.3-3+squeeze2 | 1.4.1-1 1.2.3-3+squeeze3 |
Djangoproject Django | <=1.3 | |
Djangoproject Django | =0.95 | |
Djangoproject Django | =0.96 | |
Djangoproject Django | =1.0 | |
Djangoproject Django | =1.0-alpha1 | |
Djangoproject Django | =1.0-alpha2 | |
Djangoproject Django | =1.0-beta | |
Djangoproject Django | =1.0-beta2 | |
Djangoproject Django | =1.0.1 | |
Djangoproject Django | =1.0.2 | |
Djangoproject Django | =1.1 | |
Djangoproject Django | =1.1-alpha1 | |
Djangoproject Django | =1.1-beta1 | |
Djangoproject Django | =1.1-rc1 | |
Djangoproject Django | =1.1.2 | |
Djangoproject Django | =1.1.3 | |
Djangoproject Django | =1.1.4 | |
Djangoproject Django | =1.2 | |
Djangoproject Django | =1.2-beta1 | |
Djangoproject Django | =1.2-rc1 | |
Djangoproject Django | =1.2-alpha1 | |
Djangoproject Django | =1.2.2 | |
Djangoproject Django | =1.2.4 | |
Djangoproject Django | =1.2.5 | |
Djangoproject Django | =1.2.6 | |
Djangoproject Django | =1.2.7 | |
Djangoproject Django | =1.3-alpha1 | |
Djangoproject Django | =1.3-beta1 | |
Djangoproject Django | =1.4 | |
pip/django | >=1.4<1.4.1 | 1.4.1 |
pip/django | <1.3.2 | 1.3.2 |
debian/python-django | 1:1.11.29-1~deb10u1 1:1.11.29-1+deb10u9 2:2.2.28-1~deb11u1 2:2.2.28-1~deb11u2 3:3.2.19-1 3:3.2.19-1+deb12u1 3:3.2.20-1.1 3:3.2.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.