CVE-2015-5144

NameCVE-2015-5144
DescriptionDjango before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-272-1, DSA-3305-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)buster1:1.11.29-1~deb10u1fixed
buster (security)1:1.11.29-1+deb10u11fixed
bullseye (security), bullseye2:2.2.28-1~deb11u2fixed
bookworm, bookworm (security)3:3.2.19-1+deb12u1fixed
sid, trixie3:4.2.11-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosourcesqueeze1.2.3-3+squeeze13DLA-272-1
python-djangosourcewheezy1.4.5-1+deb7u12DSA-3305-1
python-djangosourcejessie1.7.7-1+deb8u1DSA-3305-1
python-djangosource(unstable)1.7.9-1

Notes

https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5144 has split out patches

Search for package or bug name: Reporting problems