{"id":"PYSEC-2011-4","details":"Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.","aliases":["CVE-2011-4139","GHSA-rm2j-x595-q9cj"],"modified":"2024-01-16T23:12:32.838122Z","published":"2011-10-19T10:55:00Z","references":[{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=737366"},{"type":"ARTICLE","url":"https://www.djangoproject.com/weblog/2011/sep/09/"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2011/09/11/1"},{"type":"ARTICLE","url":"https://www.djangoproject.com/weblog/2011/sep/10/127/"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2011/09/13/2"},{"type":"ADVISORY","url":"http://secunia.com/advisories/46614"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2332"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/14700881"}],"affected":[{"package":{"name":"django","ecosystem":"PyPI","purl":"pkg:pypi/django"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.7"},{"introduced":"1.3"},{"fixed":"1.3.1"}]}],"versions":["1.0.1","1.0.2","1.0.3","1.0.4","1.1","1.1.1","1.1.2","1.1.3","1.1.4","1.2","1.2.1","1.2.2","1.2.3","1.2.4","1.2.5","1.2.6","1.3"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/django/PYSEC-2011-4.yaml"}}],"schema_version":"1.7.3"}