[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-5144Date: (C)2015-07-16   (M)2023-12-22


Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECTRACK-1032820
BID-75665
DSA-3305
FEDORA-2015-1dd5bc998f
GLSA-201510-06
USN-2671-1
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
openSUSE-SU-2015:1802
openSUSE-SU-2015:1813

CPE    57
cpe:/a:djangoproject:django:1.6.3
cpe:/a:djangoproject:django:1.8.1
cpe:/a:djangoproject:django:1.6.2
cpe:/a:djangoproject:django:1.8.0
...
CWE    1
CWE-20
OVAL    5
oval:org.secpod.oval:def:109939
oval:org.secpod.oval:def:602163
oval:org.secpod.oval:def:109367
oval:org.secpod.oval:def:52523
...

© SecPod Technologies