First published: Fri May 16 2014(Updated: )
The `django.util.http.is_safe_url` function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=1.7a1<1.7b4 | 1.7b4 |
pip/Django | >=1.6<1.6.5 | 1.6.5 |
pip/Django | >=1.5<1.5.8 | 1.5.8 |
pip/Django | >=1.4<1.4.13 | 1.4.13 |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Ubuntu Linux | =14.04 | |
djangoproject Django | =1.4 | |
djangoproject Django | =1.4.1 | |
djangoproject Django | =1.4.2 | |
djangoproject Django | =1.4.4 | |
djangoproject Django | =1.4.5 | |
djangoproject Django | =1.4.6 | |
djangoproject Django | =1.4.7 | |
djangoproject Django | =1.4.8 | |
djangoproject Django | =1.4.9 | |
djangoproject Django | =1.4.10 | |
djangoproject Django | =1.4.11 | |
djangoproject Django | =1.4.12 | |
djangoproject Django | =1.7-beta1 | |
djangoproject Django | =1.7-beta2 | |
djangoproject Django | =1.7-beta3 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
djangoproject Django | =1.6 | |
djangoproject Django | =1.6-beta1 | |
djangoproject Django | =1.6-beta2 | |
djangoproject Django | =1.6-beta3 | |
djangoproject Django | =1.6-beta4 | |
djangoproject Django | =1.6.1 | |
djangoproject Django | =1.6.2 | |
djangoproject Django | =1.6.3 | |
djangoproject Django | =1.6.4 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
djangoproject Django | =1.5 | |
djangoproject Django | =1.5-alpha | |
djangoproject Django | =1.5-beta | |
djangoproject Django | =1.5.1 | |
djangoproject Django | =1.5.2 | |
djangoproject Django | =1.5.3 | |
djangoproject Django | =1.5.4 | |
djangoproject Django | =1.5.5 | |
djangoproject Django | =1.5.6 | |
djangoproject Django | =1.5.7 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3730 has been rated as a medium severity vulnerability due to its potential to facilitate open redirect attacks.
To fix CVE-2014-3730, upgrade Django to version 1.4.13, 1.5.8, 1.6.5, or 1.7b4 or later.
Django versions 1.4 to 1.4.12, 1.5 to 1.5.7, 1.6 to 1.6.4, and 1.7 beta versions prior to 1.7b4 are affected by CVE-2014-3730.
CVE-2014-3730 allows attackers to perform open redirect attacks due to improper URL validation.
CVE-2014-3730 affects Django running on various operating systems, including Ubuntu and Debian, specifically the versions mentioned.