DescriptionThe verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 originally tests a URL's validity through a HEAD request, but then uses a GET request for the new target URL in the case of a redirect, which might allow remote attackers to trigger arbitrary GET requests with an unintended source IP address via a crafted Location header.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- openSUSE-SU-2012:0653-1, published Tue, 29 May 2012 12:09:10 +0200 (CEST)
List of released packages
|Product(s)||Fixed package version(s)||References|
|openSUSE 11.4|| ||Patchnames: