4.3
CVE-2015-0220
- EPSS 2.4%
- Published 16.01.2015 16:59:19
- Last modified 12.04.2025 10:46:40
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
Data is provided by the National Vulnerability Database (NVD)
Canonical ≫ Ubuntu Linux Version10.04 Editionlts
Canonical ≫ Ubuntu Linux Version12.04 Editionlts
Canonical ≫ Ubuntu Linux Version14.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version14.10
Djangoproject ≫ Django Version <= 1.4.17
Djangoproject ≫ Django Version1.6
Djangoproject ≫ Django Version1.6.1
Djangoproject ≫ Django Version1.6.2
Djangoproject ≫ Django Version1.6.3
Djangoproject ≫ Django Version1.6.4
Djangoproject ≫ Django Version1.6.5
Djangoproject ≫ Django Version1.6.6
Djangoproject ≫ Django Version1.6.7
Djangoproject ≫ Django Version1.6.8
Djangoproject ≫ Django Version1.6.9
Djangoproject ≫ Django Version1.7
Djangoproject ≫ Django Version1.7.1
Djangoproject ≫ Django Version1.7.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.4% | 0.846 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.