First published: Wed Oct 10 2012(Updated: )
It was reported that Django's built-in parsing of the Host header was incorrectly handling username/password information (in django.http.HttpRequest.get_host()). This could allow a remote attacker to cause parts of Django, in particular the password-reset mechanism, to generate and display arbitrary URLs to end-users. Acknowledgements: Red Hat would like to thank the upstream Django project for reporting this vulnerability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django | >=1.4<1.4.2 | 1.4.2 |
pip/django | >=1.3<1.3.4 | 1.3.4 |
Djangoproject Django | =1.3 | |
Djangoproject Django | =1.3-alpha1 | |
Djangoproject Django | =1.3-beta1 | |
Djangoproject Django | =1.3.1 | |
Djangoproject Django | =1.3.2 | |
Djangoproject Django | =1.3.3 | |
Djangoproject Django | =1.4 | |
Djangoproject Django | =1.4.1 | |
redhat/Django | <1.3.4 | 1.3.4 |
redhat/Django | <1.4.2 | 1.4.2 |
debian/python-django | 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:4.2.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.