CVE-2015-5144

Priority
Description
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x
before 1.8.3 uses an incorrect regular expression, which allows remote
attackers to inject arbitrary headers and conduct HTTP response splitting
attacks via a newline character in an (1) email message to the
EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to
the (3) validate_ipv4_address or (4) validate_slug validator.
Assigned-to
mdeslaur
Notes
Package
Upstream:released (1.4.21,1.7.9,1.8.3)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.6.1-2ubuntu0.9)
More Information

Updated: 2020-09-10 04:45:04 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)