Bug 1311431 (CVE-2016-2512)
Summary: | CVE-2016-2512 python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> | ||||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||||
Severity: | medium | Docs Contact: | |||||||||
Priority: | medium | ||||||||||
Version: | unspecified | CC: | abaron, aortega, apevec, ayoung, bkearney, cbillett, chrisw, dallan, gkotton, jjoyce, jschluet, kbasil, kseifried, lars, lhh, lpeer, markmc, mburns, mrunge, rbryant, sclewis, security-response-team, slinaber, slong, tdecacqu, tomckay, yeylon | ||||||||
Target Milestone: | --- | Keywords: | Security | ||||||||
Target Release: | --- | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | python-django 1.8.10, python-django 1.9.3 | Doc Type: | Bug Fix | ||||||||
Doc Text: |
An open-redirect flaw was found in the way Django's django.utils.http.is_safe_url() function filtered authentication URLs. An attacker able to trick a victim into visiting a crafted URL could use this flaw to redirect that victim to a malicious site.
|
Story Points: | --- | ||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2016-04-08 00:56:01 UTC | Type: | --- | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Bug Depends On: | 1314341, 1314342, 1314343, 1314344, 1314345, 1315207, 1315208, 1315209, 1315211, 1315213, 1315217, 1315218 | ||||||||||
Bug Blocks: | 1311442 | ||||||||||
Attachments: |
|
Description
Adam Mariš
2016-02-24 09:06:49 UTC
Created attachment 1130108 [details]
Upstream patch 1.8.x
Created attachment 1130110 [details]
Upstream patch 1.9.x
Created attachment 1130112 [details]
Upstream patch master
Commit message contains wrong CVE number, CVE-2016-2512 is correct. External Reference: https://www.djangoproject.com/weblog/2016/mar/01/security-releases/ Created Django14 tracking bugs for this issue: Affects: epel-6 [bug 1314343] Created python-django15 tracking bugs for this issue: Affects: epel-6 [bug 1314344] Created python-django tracking bugs for this issue: Affects: fedora-all [bug 1314342] Affects: epel-7 [bug 1314345] Acknowledgments: Name: the Django project python-django-1.8.11-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. python-django-1.8.11-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 Via RHSA-2016:0506 https://rhn.redhat.com/errata/RHSA-2016-0506.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Via RHSA-2016:0505 https://rhn.redhat.com/errata/RHSA-2016-0505.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Via RHSA-2016:0504 https://rhn.redhat.com/errata/RHSA-2016-0504.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 Operational Tools for RHEL 7 Via RHSA-2016:0503 https://rhn.redhat.com/errata/RHSA-2016-0503.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 Via RHSA-2016:0502 https://rhn.redhat.com/errata/RHSA-2016-0502.html python-django-1.6.11-5.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report. |