Miggo Logo

CVE-2017-7234:
Django open redirect

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.61248%
Published
1/4/2019
Updated
9/18/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
djangopip>= 1.10, < 1.10.71.10.7
djangopip>= 1.9, < 1.9.131.9.13
djangopip>= 1.8, < 1.8.181.8.18

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the pre-patch code in django.views.static.serve() which contained path normalization logic followed by an HttpResponseRedirect if the path was modified. This allowed attackers to manipulate the 'path' parameter to create open redirects. The commit diff shows removal of the redirect logic and replacement with safe_join(), confirming this was the vulnerable code path. The CVE description explicitly references this function as the attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* m*li*iously *r**t** URL to * *j*n*o (*.** ***or* *.**.*, *.* ***or* *.*.**, *n* *.* ***or* *.*.**) sit* usin* t** `*j*n*o.vi*ws.st*ti*.s*rv*()` vi*w *oul* r**ir**t to *ny ot**r *om*in, *k* *n op*n r**ir**t vuln*r**ility.

Reasoning

T** vuln*r**ility st*ms *rom t** pr*-p*t** *o** in *j*n*o.vi*ws.st*ti*.s*rv*() w*i** *ont*in** p*t* norm*liz*tion lo*i* *ollow** *y *n *ttpR*spons*R**ir**t i* t** p*t* w*s mo*i*i**. T*is *llow** *tt**k*rs to m*nipul*t* t** 'p*t*' p*r*m*t*r to *r**t*