-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| django | pip | < 1.4.18 | 1.4.18 |
| Django | pip | >= 1.6, < 1.6.10 | 1.6.10 |
| Django | pip | >= 1.7, < 1.7.3 | 1.7.3 |
The vulnerability stems from how Django's WSGIRequestHandler processed headers before the patch. The commit diff shows a critical addition to get_environ() that strips headers with underscores, explicitly addressing CVE-2015-0219. The unpatched version lacked this security check, making WSGI environ vulnerable to spoofing. The documentation changes and test cases in the commit further confirm this was the attack vector. No other functions are mentioned in the vulnerability context as being directly involved in the header normalization process.
KEV Misses 88% of Exploited CVEs- Get the report