CVE-2017-7233

Metadata

medium
5.8
python-django
CVE-2017-7233
cve.mitre.org, djangoproject.com, ubuntu.com
2017-04-04
2017-06-16 19:22
v3.6/main/py-django-1.10.7-r0
v3.4/main/py-django-1.8.18-r0
v3.5/main/py-django-1.8.18-r0
CVE-2017-7233 python-django
2017-06-15 02:31
2017-04-10 19:05
2017-04-06 02:03
2017-04-04 19:15

Description

Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
devel python-django 1.8.7-1ubuntu11
precise python-django 1.3.1-4ubuntu1.23
trusty python-django 1.6.11-0ubuntu1.1
upstream python-django 1.8.18
xenial python-django 1.8.7-1ubuntu5.5
yakkety python-django 1.8.7-1ubuntu8.2

Unaffected

Release Package Reason
vivid/stable-phone-overlay python-django DNE
vivid/ubuntu-core python-django DNE