CVE-2019-12781

NameCVE-2019-12781
DescriptionAn issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1842-1, DSA-4476-1
NVD severitymedium (attack range: remote)
Debian Bugs931316

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)jessie1.7.11-1+deb8u3vulnerable
jessie (security)1.7.11-1+deb8u7fixed
stretch1:1.10.7-2+deb9u4vulnerable
stretch (security)1:1.10.7-2+deb9u6fixed
bullseye, buster1:1.11.21-1vulnerable
buster (security)1:1.11.23-1~deb10u1fixed
sid2:2.2.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosource(unstable)1:1.11.22-1medium931316
python-djangosourcebuster1:1.11.22-1~deb10u1medium
python-djangosourcejessie1.7.11-1+deb8u6mediumDLA-1842-1
python-djangosourcestretch1:1.10.7-2+deb9u5mediumDSA-4476-1

Notes

https://www.djangoproject.com/weblog/2019/jul/01/security-releases/
https://github.com/django/django/commit/54d0f5e62f54c29a12dd96f44bacd810cbe03ac8 (master)
https://github.com/django/django/commit/77706a3e4766da5d5fb75c4db22a0a59a28e6cd6 (2.2)
https://github.com/django/django/commit/1e40f427bb8d0fb37cc9f830096a97c36c97af6f (2.1)
https://github.com/django/django/commit/32124fc41e75074141b05f10fc55a4f01ff7f050 (1.11)

Search for package or bug name: Reporting problems