CVE-2015-0220
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
16/01/2015
Last modified:
12/04/2025
Description
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* | 1.4.17 (including) | |
| cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://secunia.com/advisories/62285
- http://secunia.com/advisories/62309
- http://secunia.com/advisories/62718
- http://ubuntu.com/usn/usn-2469-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A036
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A109
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://secunia.com/advisories/62285
- http://secunia.com/advisories/62309
- http://secunia.com/advisories/62718
- http://ubuntu.com/usn/usn-2469-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A036
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A109
- https://www.djangoproject.com/weblog/2015/jan/13/security/



