GHSA-wxg3-mfph-qg9w

Suggest an improvement
Source
https://github.com/advisories/GHSA-wxg3-mfph-qg9w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wxg3-mfph-qg9w/GHSA-wxg3-mfph-qg9w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wxg3-mfph-qg9w
Aliases
Published
2022-05-14T03:49:36Z
Modified
2024-02-22T05:33:58.888301Z
Summary
Django Might Allow CSRF Requests via URL Verification
Details

The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.

References

Affected packages

PyPI / django

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.7

Affected versions

1.*

1.0.1
1.0.2
1.0.3
1.0.4
1.1
1.1.1
1.1.2
1.1.3
1.1.4
1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6

PyPI / django

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.3.0
Fixed
1.3.1

Affected versions

1.*

1.3