CVE-2018-14574: Django open redirect
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.9416%
CWE
Published
10/4/2018
Updated
9/17/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
django | pip | >= 2.0, < 2.0.8 | 2.0.8 |
Django | pip | >= 1.11, < 1.11.15 | 1.11.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key areas: 1) CommonMiddleware's URL redirection logic in get_full_path_with_slash didn't escape leading slashes when constructing redirect URLs, allowing scheme-relative URLs. 2) The URL resolver's _reverse_with_prefix function similarly didn't handle leading slashes properly. The commits show both locations were patched with escape_leading_slashes calls. The CVE description and patch diffs confirm these functions were the attack vectors for open redirects when APPEND_SLASH was enabled and specific URL patterns existed.