Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-6044


The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme.


Published

2013-10-04T17:55:10.040

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application djangoproject django 1.4 Yes
Application djangoproject django 1.4.1 Yes
Application djangoproject django 1.4.2 Yes
Application djangoproject django 1.4.4 Yes
Application djangoproject django 1.4.5 Yes
Application djangoproject django 1.5 Yes
Application djangoproject django 1.5.1 Yes
Application djangoproject django 1.6 Yes

References