You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
CVE-2016-9014 - High Severity Vulnerability
Vulnerable Library - Django-1.9.6-py2.py3-none-any.whl
A high-level Python Web framework that encourages rapid development and clean, pragmatic design.
path: /example-python
Library home page: https://pypi.python.org/packages/cb/97/081df31f2a3850988b92ad4464e95f9e4b257aa5a34e120bca89c260de96/Django-1.9.6-py2.py3-none-any.whl
Dependency Hierarchy:
Vulnerability Details
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
Publish Date: 2016-12-09
URL: CVE-2016-9014
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1037159
Release Date: 2017-12-31
Fix Resolution: The vendor has issued a fix (1.8.16, 1.9.11, 1.10.3).
The vendor advisory is available at:
https://www.djangoproject.com/weblog/2016/nov/01/security-releases/
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: