DescriptionThe verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
SUSE Security Advisories:
- openSUSE-SU-2012:0653-1, published Tue, 29 May 2012 12:09:10 +0200 (CEST)
SUSE Timeline for this CVECVE page created: Tue Jul 9 19:19:15 2013
CVE page last modified: Fri Oct 7 12:46:10 2022