First published: Fri Dec 09 2016(Updated: )
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=1.10a1<1.10.3 | 1.10.3 |
pip/Django | >=1.9a1<1.9.11 | 1.9.11 |
pip/Django | >=1.8a1<1.8.16 | 1.8.16 |
Fedora | =24 | |
Fedora | =25 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =16.10 | |
Django | =1.8 | |
Django | =1.8.1 | |
Django | =1.8.2 | |
Django | =1.8.3 | |
Django | =1.8.4 | |
Django | =1.8.5 | |
Django | =1.8.6 | |
Django | =1.8.7 | |
Django | =1.8.8 | |
Django | =1.8.9 | |
Django | =1.8.10 | |
Django | =1.8.11 | |
Django | =1.8.12 | |
Django | =1.8.13 | |
Django | =1.8.14 | |
Django | =1.8.15 | |
Django | =1.10 | |
Django | =1.10.1 | |
Django | =1.10.2 | |
Django | =1.9 | |
Django | =1.9.1 | |
Django | =1.9.2 | |
Django | =1.9.3 | |
Django | =1.9.4 | |
Django | =1.9.5 | |
Django | =1.9.6 | |
Django | =1.9.7 | |
Django | =1.9.8 | |
Django | =1.9.9 | |
Django | =1.9.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9014 is rated as a high-severity vulnerability due to its potential for DNS rebinding attacks.
To fix CVE-2016-9014, upgrade your Django version to at least 1.8.16, 1.9.11, or 1.10.3.
CVE-2016-9014 affects Django versions prior to 1.8.16, 1.9.11, and 1.10.3 when the settings.DEBUG is set to True.
Yes, CVE-2016-9014 can be exploited remotely by attackers leveraging the unvalidated HTTP Host header.
A DNS rebinding attack allows an attacker to bypass the browser's same-origin policy and interact with services in the local network.