The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/07/31/1 | mailing list |
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ | patch vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 | vendor advisory |
http://www.ubuntu.com/usn/USN-1560-1 | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/07/31/2 | mailing list |
http://www.debian.org/security/2012/dsa-2529 | vendor advisory |