Description
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-143-1 | python-django security update |
Debian DSA |
DSA-3151-1 | python-django security update |
EUVD |
EUVD-2015-0013 | Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header. |
Github GHSA |
GHSA-7qfw-j7hp-v45g | Django WSGI Header Spoofing Vulnerability |
Ubuntu USN |
USN-2469-1 | Django vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T04:03:10.188Z
Reserved: 2014-11-18T00:00:00.000Z
Link: CVE-2015-0219
No data.
Status : Modified
Published: 2015-01-16T16:59:18.657
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-0219
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN