First published: Tue Jul 14 2015(Updated: )
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
Canonical Ubuntu Linux | =15.10 | |
Djangoproject Django | <=1.4.20 | |
Djangoproject Django | =1.5 | |
Djangoproject Django | =1.5-alpha | |
Djangoproject Django | =1.5-beta | |
Djangoproject Django | =1.5.1 | |
Djangoproject Django | =1.5.2 | |
Djangoproject Django | =1.5.3 | |
Djangoproject Django | =1.5.4 | |
Djangoproject Django | =1.5.5 | |
Djangoproject Django | =1.5.6 | |
Djangoproject Django | =1.5.7 | |
Djangoproject Django | =1.5.8 | |
Djangoproject Django | =1.5.9 | |
Djangoproject Django | =1.5.10 | |
Djangoproject Django | =1.5.11 | |
Djangoproject Django | =1.5.12 | |
Djangoproject Django | =1.6 | |
Djangoproject Django | =1.6-beta1 | |
Djangoproject Django | =1.6-beta2 | |
Djangoproject Django | =1.6-beta3 | |
Djangoproject Django | =1.6-beta4 | |
Djangoproject Django | =1.6.1 | |
Djangoproject Django | =1.6.2 | |
Djangoproject Django | =1.6.3 | |
Djangoproject Django | =1.6.4 | |
Djangoproject Django | =1.6.5 | |
Djangoproject Django | =1.6.6 | |
Djangoproject Django | =1.6.7 | |
Djangoproject Django | =1.6.8 | |
Djangoproject Django | =1.6.9 | |
Djangoproject Django | =1.6.10 | |
Djangoproject Django | =1.7-beta1 | |
Djangoproject Django | =1.7-beta2 | |
Djangoproject Django | =1.7-beta3 | |
Djangoproject Django | =1.7-beta4 | |
Djangoproject Django | =1.7-rc1 | |
Djangoproject Django | =1.7-rc2 | |
Djangoproject Django | =1.7-rc3 | |
Djangoproject Django | =1.7.1 | |
Djangoproject Django | =1.7.2 | |
Djangoproject Django | =1.7.3 | |
Djangoproject Django | =1.7.4 | |
Djangoproject Django | =1.7.5 | |
Djangoproject Django | =1.7.6 | |
Djangoproject Django | =1.7.7 | |
Djangoproject Django | =1.7.8 | |
Djangoproject Django | =1.7.9 | |
Djangoproject Django | =1.8-beta1 | |
Djangoproject Django | =1.8.0 | |
Djangoproject Django | =1.8.1 | |
Djangoproject Django | =1.8.2 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Oracle Solaris | =11.3 | |
pip/Django | >=1.8a1<1.8.3 | 1.8.3 |
pip/Django | >=1.5<1.7.9 | 1.7.9 |
pip/django | <1.4.21 | 1.4.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.