Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3835 | |
http://www.securityfocus.com/bid/94068 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037159 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-3115-1 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXDKJYHN74BWY3P7AR2UZDVJREQMRE6S/ | |
https://www.djangoproject.com/weblog/2016/nov/01/security-releases/ | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2016-12-09 20:59
Updated : 2023-11-07 02:36
NVD link : CVE-2016-9014
Mitre link : CVE-2016-9014
CVE.ORG link : CVE-2016-9014
JSON object : View
Products Affected
djangoproject
- django
canonical
- ubuntu_linux
fedoraproject
- fedora
CWE
CWE-264
Permissions, Privileges, and Access Controls