The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
https://www.djangoproject.com/weblog/2012/oct/17/security/
https://github.com/django/django/commit/b45c377f8f488955e0c7069cad3f3dd21910b071
https://github.com/django/django/commit/9305c0e12d43c4df999c3301a1f0c742264a657e
https://github.com/django/django/commit/92d3430f12171f16f566c9050c40feefb830a4a3
https://bugzilla.redhat.com/show_bug.cgi?id=865164
http://www.openwall.com/lists/oss-security/2012/10/30/4
http://www.debian.org/security/2013/dsa-2634
http://ubuntu.com/usn/usn-1757-1
http://ubuntu.com/usn/usn-1632-1
http://securitytracker.com/id?1027708
http://secunia.com/advisories/51314
http://secunia.com/advisories/51033
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090970.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090904.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090666.html
Published: 2012-11-18
Updated: 2025-04-11
Base Score: 6.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity: High
Base Score: 8.7
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: High