Vulnerability Description
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Opensuse | 12.3 |
| Djangoproject | Django | 1.7 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
- http://secunia.com/advisories/59782
- http://secunia.com/advisories/61276
- http://secunia.com/advisories/61281
- http://www.debian.org/security/2014/dsa-3010
- http://www.securityfocus.com/bid/69425
- https://www.djangoproject.com/weblog/2014/aug/20/security/PatchVendor Advisory
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html
- http://secunia.com/advisories/59782
- http://secunia.com/advisories/61276
- http://secunia.com/advisories/61281
- http://www.debian.org/security/2014/dsa-3010
- http://www.securityfocus.com/bid/69425
- https://www.djangoproject.com/weblog/2014/aug/20/security/PatchVendor Advisory
FAQ
What is CVE-2014-0480?
CVE-2014-0480 is a vulnerability with a CVSS score of 5.8 (MEDIUM). The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attacker...
How severe is CVE-2014-0480?
CVE-2014-0480 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0480?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Djangoproject Django.