An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2:2.2.12-1ubuntu0.29+esm1", "binary_name": "python-django-doc" }, { "binary_version": "2:2.2.12-1ubuntu0.29+esm1", "binary_name": "python3-django" } ], "priority_reason": "only allows injecting ANSI charactes into log files" }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2:3.2.12-2ubuntu1.19", "binary_name": "python-django-doc" }, { "binary_version": "2:3.2.12-2ubuntu1.19", "binary_name": "python3-django" } ], "priority_reason": "only allows injecting ANSI charactes into log files" }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "3:4.2.15-1ubuntu1.5", "binary_name": "python-django-doc" }, { "binary_version": "3:4.2.15-1ubuntu1.5", "binary_name": "python3-django" } ], "priority_reason": "only allows injecting ANSI charactes into log files" }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "3:4.2.11-1ubuntu1.8", "binary_name": "python-django-doc" }, { "binary_version": "3:4.2.11-1ubuntu1.8", "binary_name": "python3-django" } ], "priority_reason": "only allows injecting ANSI charactes into log files" }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "3:4.2.18-1ubuntu1.2", "binary_name": "python-django-doc" }, { "binary_version": "3:4.2.18-1ubuntu1.2", "binary_name": "python3-django" } ], "priority_reason": "only allows injecting ANSI charactes into log files" }