Django - Open Redirect
ID: CVE-2018-14574
Severity: medium
Author: pikpikcu
Tags: cve,cve2018,django,redirect,djangoproject
Description
Section titled “Description”Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 contains an open redirect vulnerability. If django.middleware.common.CommonMiddleware and APPEND_SLASH settings are selected, and if the project has a URL pattern that accepts any path ending in a slash, an attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2018-14574
info: name: Django - Open Redirect author: pikpikcu severity: medium description: Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 contains an open redirect vulnerability. If django.middleware.common.CommonMiddleware and APPEND_SLASH settings are selected, and if the project has a URL pattern that accepts any path ending in a slash, an attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | An attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks or the exploitation of other vulnerabilities. remediation: | Upgrade to the latest version of Django or apply the relevant patch provided by the Django project. reference: - https://www.djangoproject.com/weblog/2018/aug/01/security-releases/ - https://usn.ubuntu.com/3726-1/ - http://web.archive.org/web/20211206044224/https://securitytracker.com/id/1041403 - https://www.debian.org/security/2018/dsa-4264 - https://access.redhat.com/errata/RHSA-2019:0265 - https://nvd.nist.gov/vuln/detail/CVE-2018-14574 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2018-14574 cwe-id: CWE-601 epss-score: 0.00628 epss-percentile: 0.78964 cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: djangoproject product: django shodan-query: cpe:"cpe:2.3:a:djangoproject:django" tags: cve,cve2018,django,redirect,djangoproject
http: - method: GET path: - "{{BaseURL}}//www.interact.sh"
matchers-condition: and matchers: - type: word part: header words: - "Location: https://www.interact.sh" - "Location: http://www.interact.sh"
- type: status status: - 301# digest: 490a00463044022008fc486174956e4670fdb89b149e3d4c62a6e3b73deb46e38468362fa8085a390220228821f42445c174f485ee5c96311ff96724af732cc301bea5408059a33faf4b:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-14574.yaml"