Input validation error in Django - CVE-2012-4520
Published: November 19, 2012 / Updated: August 11, 2020
Vulnerability identifier: #VU43328
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2012-4520
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Django Software Foundation
Affected software:
Django
Django
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
How to mitigate CVE-2012-4520
Install update from vendor's website.
Sources
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
- http://secunia.com/advisories/51033
- http://secunia.com/advisories/51314
- http://securitytracker.com/id?1027708
- http://ubuntu.com/usn/usn-1632-1
- http://ubuntu.com/usn/usn-1757-1
- http://www.debian.org/security/2013/dsa-2634
- http://www.openwall.com/lists/oss-security/2012/10/30/4
- http://www.osvdb.org/86493
- https://bugzilla.redhat.com/show_bug.cgi?id=865164
- https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
- https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
- https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
- https://www.djangoproject.com/weblog/2012/oct/17/security/