[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-23011":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":53,"name":54,"published":55,"updated":34},23011,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},2,"Nuclei",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":46,"epss_score":47,"epss_percentile":48,"cve":49,"in_cisa_catalog":51,"date":52,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"medium","The risk exists that an attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks or the exploitation of other vulnerabilities.","Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 contains an open redirect vulnerability. If  django.middleware.common.CommonMiddleware and APPEND_SLASH settings are selected, and if the project has a URL pattern that accepts any path ending in a slash, an attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.","Upgrade to the latest version of Django or apply the relevant patch provided by the Django project.",[40,41,42,43,44,45],"https://www.djangoproject.com/weblog/2018/aug/01/security-releases/","https://usn.ubuntu.com/3726-1/","http://web.archive.org/web/20211206044224/https://securitytracker.com/id/1041403","https://www.debian.org/security/2018/dsa-4264","https://access.redhat.com/errata/RHSA-2019:0265","https://nvd.nist.gov/vuln/detail/CVE-2018-14574",6.1,0.07477,0.91755,[50],"CVE-2018-14574",false,"2018-08-03T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2018-14574","Django - Open Redirect","2024-08-09T00:00:00Z"]