Vulnerability Details CVE-2011-4138
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.3%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2011-4138
-
cpe:2.3:a:djangoproject:django:0.91
-
cpe:2.3:a:djangoproject:django:0.95
-
cpe:2.3:a:djangoproject:django:0.95.1
-
cpe:2.3:a:djangoproject:django:0.96
-
cpe:2.3:a:djangoproject:django:1.0
-
cpe:2.3:a:djangoproject:django:1.0.1
-
cpe:2.3:a:djangoproject:django:1.0.2
-
cpe:2.3:a:djangoproject:django:1.1
-
cpe:2.3:a:djangoproject:django:1.1.0
-
cpe:2.3:a:djangoproject:django:1.1.2
-
cpe:2.3:a:djangoproject:django:1.1.3
-
cpe:2.3:a:djangoproject:django:1.1.4
-
cpe:2.3:a:djangoproject:django:1.2
-
cpe:2.3:a:djangoproject:django:1.2-alpha1
-
cpe:2.3:a:djangoproject:django:1.2.1
-
cpe:2.3:a:djangoproject:django:1.2.2
-
cpe:2.3:a:djangoproject:django:1.2.3
-
cpe:2.3:a:djangoproject:django:1.2.4
-
cpe:2.3:a:djangoproject:django:1.2.5
-
cpe:2.3:a:djangoproject:django:1.2.6
-
cpe:2.3:a:djangoproject:django:1.3