Lucene search

K
githubGitHub Advisory DatabaseGHSA-WXG3-MFPH-QG9W
HistoryMay 14, 2022 - 3:49 a.m.

Django Might Allow CSRF Requests via URL Verification

2022-05-1403:49:36
CWE-20
GitHub Advisory Database
github.com
9
django
urlfield
verify_exists
vulnerability
head request
get request
remote attackers
source ip address
location header
security issue

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.007

Percentile

80.9%

The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL’s validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.

Affected configurations

Vulners
Node
djangoRange1.31.3.1
OR
djangoRange<1.2.7
VendorProductVersionCPE
*django*cpe:2.3:a:*:django:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.007

Percentile

80.9%