MEDIUM · 4.3

CVE-2015-0220

The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cr...

Vulnerability Description

The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux10.04
DjangoprojectDjango<= 1.4.17

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-0220?

CVE-2015-0220 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cr...

How severe is CVE-2015-0220?

CVE-2015-0220 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-0220?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Djangoproject Django.