.. / CVE-2018-14574

Exploit for Django - Open Redirect (CVE-2018-14574)

Description:

Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 contains an open redirect vulnerability. If django.middleware.common.CommonMiddleware and APPEND_SLASH settings are selected, and if the project has a URL pattern that accepts any path ending in a slash, an attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

Nuclei Template

View the template here CVE-2018-14574.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2018/CVE-2018-14574.yaml
Copy

References:

https://www.debian.org/security/2018/dsa-4264
https://nvd.nist.gov/vuln/detail/CVE-2018-14574
http://web.archive.org/web/20211206044224/https://securitytracker.com/id/1041403
https://usn.ubuntu.com/3726-1/
https://www.djangoproject.com/weblog/2018/aug/01/security-releases/
https://access.redhat.com/errata/RHSA-2019:0265