First published: Wed Apr 23 2014(Updated: )
The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Django | <=1.4.10 | |
Djangoproject Django | =1.4 | |
Djangoproject Django | =1.4.1 | |
Djangoproject Django | =1.4.2 | |
Djangoproject Django | =1.4.3 | |
Djangoproject Django | =1.4.4 | |
Djangoproject Django | =1.4.5 | |
Djangoproject Django | =1.4.6 | |
Djangoproject Django | =1.4.7 | |
Djangoproject Django | =1.4.8 | |
Djangoproject Django | =1.4.9 | |
Djangoproject Django | =1.6 | |
Djangoproject Django | =1.6.1 | |
Djangoproject Django | =1.6.2 | |
Djangoproject Django | =1.7-alpha1 | |
Djangoproject Django | =1.7-alpha2 | |
Djangoproject Django | =1.7-beta1 | |
Djangoproject Django | =1.5 | |
Djangoproject Django | =1.5.1 | |
Djangoproject Django | =1.5.2 | |
Djangoproject Django | =1.5.3 | |
Djangoproject Django | =1.5.4 | |
Djangoproject Django | =1.5.5 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.10 | |
Canonical Ubuntu Linux | =14.04 | |
pip/Django | >=1.6<1.6.3 | 1.6.3 |
pip/Django | >=1.5<1.5.6 | 1.5.6 |
pip/Django | <1.4.11 | 1.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.