CVE-2017-7233

medium

Description

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

References

http://www.debian.org/security/2017/dsa-3835

http://www.securityfocus.com/bid/97406

http://www.securitytracker.com/id/1038177

https://access.redhat.com/errata/RHSA-2017:1445

https://access.redhat.com/errata/RHSA-2017:1451

https://access.redhat.com/errata/RHSA-2017:1462

https://access.redhat.com/errata/RHSA-2017:1470

https://access.redhat.com/errata/RHSA-2017:1596

https://access.redhat.com/errata/RHSA-2017:3093

https://access.redhat.com/errata/RHSA-2018:2927

https://www.djangoproject.com/weblog/2017/apr/04/security-releases/

Details

Source: MITRE

Published: 2017-04-04

Updated: 2018-10-17

Type: CWE-601

Risk Information

CVSS v2

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Impact Score: 2.7

Exploitability Score: 2.8

Severity: MEDIUM