CVE-2017-7233
Severity CVSS v4.0:
Pending analysis
Type:
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Publication date:
04/04/2017
Last modified:
20/04/2025
Description
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.0:a1:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.0:b1:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.0:b2:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.0:c1:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2017/dsa-3835
- http://www.securityfocus.com/bid/97406
- http://www.securitytracker.com/id/1038177
- https://access.redhat.com/errata/RHSA-2017:1445
- https://access.redhat.com/errata/RHSA-2017:1451
- https://access.redhat.com/errata/RHSA-2017:1462
- https://access.redhat.com/errata/RHSA-2017:1470
- https://access.redhat.com/errata/RHSA-2017:1596
- https://access.redhat.com/errata/RHSA-2017:3093
- https://access.redhat.com/errata/RHSA-2018:2927
- https://www.djangoproject.com/weblog/2017/apr/04/security-releases/
- http://www.debian.org/security/2017/dsa-3835
- http://www.securityfocus.com/bid/97406
- http://www.securitytracker.com/id/1038177
- https://access.redhat.com/errata/RHSA-2017:1445
- https://access.redhat.com/errata/RHSA-2017:1451
- https://access.redhat.com/errata/RHSA-2017:1462
- https://access.redhat.com/errata/RHSA-2017:1470
- https://access.redhat.com/errata/RHSA-2017:1596
- https://access.redhat.com/errata/RHSA-2017:3093
- https://access.redhat.com/errata/RHSA-2018:2927
- https://www.djangoproject.com/weblog/2017/apr/04/security-releases/



