Bug 1437234 (CVE-2017-7233)
| Summary: | CVE-2017-7233 python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> | ||||||||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||||||||||
| Severity: | medium | Docs Contact: | |||||||||||||||
| Priority: | medium | ||||||||||||||||
| Version: | unspecified | CC: | aortega, apevec, bcourt, bkabrda, bkearney, cbillett, chrisw, cvsbot-xmlrpc, hvyas, jakub.dornak, jal233, jjoyce, jmatthew, jschluet, kbasil, kseifried, lhh, lpeer, markmc, mburns, mhroncok, michel, mmccune, mrike, mrunge, ohadlevy, rbryant, rchan, rhos-maint, sclewis, security-response-team, sisharma, slinaber, slong, smooge, srevivo, tdecacqu, tjay, tlestach, tomckay, tsanders, ttereshc | ||||||||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||||||||
| Target Release: | --- | ||||||||||||||||
| Hardware: | All | ||||||||||||||||
| OS: | Linux | ||||||||||||||||
| Whiteboard: | |||||||||||||||||
| Fixed In Version: | python-django 1.8.18, python-django 1.9.13, python-django 1.10.7, python-django 1.11 | Doc Type: | If docs needed, set a value | ||||||||||||||
| Doc Text: |
A redirect flaw, where the is_safe_url() function did not correctly sanitize numeric-URL user input, was found in python-django. A remote attacker could exploit this flaw to perform XSS attacks against the OpenStack dashboard.
|
Story Points: | --- | ||||||||||||||
| Clone Of: | Environment: | ||||||||||||||||
| Last Closed: | 2017-10-31 23:54:59 UTC | Type: | --- | ||||||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||||||
| Documentation: | --- | CRM: | |||||||||||||||
| Verified Versions: | Category: | --- | |||||||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||||||
| Embargoed: | |||||||||||||||||
| Bug Depends On: | 1437734, 1437735, 1437736, 1437737, 1437739, 1469881, 1488634, 1488635, 1488636, 1488637, 1543945, 1543946 | ||||||||||||||||
| Bug Blocks: | 1437237 | ||||||||||||||||
| Attachments: |
|
||||||||||||||||
|
Description
Adam Mariš
2017-03-29 20:36:33 UTC
Acknowledgments: Name: the Django project Created attachment 1267353 [details]
Upstream patch 1.10.x
Created attachment 1267354 [details]
Upstream patch 1.8.x
Created attachment 1267355 [details]
Upstream patch 1.9.x
Created attachment 1267356 [details]
Upstream patch 1.11.x
Created attachment 1267357 [details]
Upstream patch master
Created attachment 1269476 [details]
Backport to 1.6.11
This issue has been addressed in the following products: Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:1462 https://access.redhat.com/errata/RHSA-2017:1462 This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Via RHSA-2017:1451 https://access.redhat.com/errata/RHSA-2017:1451 This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Via RHSA-2017:1445 https://access.redhat.com/errata/RHSA-2017:1445 This issue has been addressed in the following products: Red Hat OpenStack Platform 8.0 (Liberty) Via RHSA-2017:1470 https://access.redhat.com/errata/RHSA-2017:1470 This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2017:1596 https://access.redhat.com/errata/RHSA-2017:1596 Created Django14 tracking bugs for this issue: Affects: epel-6 [bug 1488635] Created python-django tracking bugs for this issue: Affects: epel-7 [bug 1488634] Affects: fedora-all [bug 1488636] This issue has been addressed in the following products: Red Hat OpenStack Platform 11.0 (Ocata) Via RHSA-2017:3093 https://access.redhat.com/errata/RHSA-2017:3093 Statement: This issue affects the versions of python-django as shipped with Red Hat Satellite 6. Please note that python-django, as used by Pulp does not make use of the Pulp doesn't use "is_safe_url" directly or the "i18n" views or the "django.contrib.auth" Login view. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. This issue has been addressed in the following products: Red Hat Satellite 6.4 for RHEL 7 Via RHSA-2018:2927 https://access.redhat.com/errata/RHSA-2018:2927 |