Vulnerability Description
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Djangoproject | Django | <= 1.4.17 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.ht
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.ht
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.ht
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://secunia.com/advisories/62285
- http://secunia.com/advisories/62309
- http://secunia.com/advisories/62718
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
- http://www.ubuntu.com/usn/USN-2469-1PatchVendor Advisory
- https://www.djangoproject.com/weblog/2015/jan/13/security/ExploitPatchVendor Advisory
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.ht
FAQ
What is CVE-2015-0219?
CVE-2015-0219 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, ...
How severe is CVE-2015-0219?
CVE-2015-0219 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0219?
Check the references section above for vendor advisories and patch information. Affected products include: Djangoproject Django.