Show plain JSON{"affected_release": [{"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "graphite-web-0:1.1.4-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "python-cachetools-0:1.0.3-1.1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "python-carbon-0:1.1.4-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "python-django-0:1.11.15-4.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "python-django-tagging-0:0.4.6-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "python-scandir-0:1.3-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "python-whisper-0:1.1.4-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "tendrl-ansible-0:1.6.3-11.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "tendrl-api-0:1.6.3-10.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "tendrl-commons-0:1.6.3-15.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "tendrl-monitoring-integration-0:1.6.3-20.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "tendrl-node-agent-0:1.6.3-15.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}, {"advisory": "RHSA-2019:0265", "cpe": "cpe:/a:redhat:storage:3.4:na:el7", "package": "tendrl-selinux-0:1.5.4-3.el7rhgs", "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", "release_date": "2019-02-04T00:00:00Z"}], "bugzilla": {"description": "django: Open redirect possibility in CommonMiddleware", "id": "1609031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609031"}, "csaw": false, "cvss3": {"cvss3_base_score": "4.7", "cvss3_scoring_vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "status": "verified"}, "cwe": "CWE-601", "details": ["django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.", "When using the django.middleware.common.CommonMiddleware class with the APPEND_SLASH setting enabled, Django projects which accept paths ending in a slash may be vulnerable to an unvalidated HTTP redirect."], "name": "CVE-2018-14574", "package_state": [{"cpe": "cpe:/a:redhat:ceph_storage:2", "fix_state": "Affected", "package_name": "python-django", "product_name": "Red Hat Ceph Storage 2"}, {"cpe": "cpe:/a:redhat:ceph_storage:3", "fix_state": "Affected", "package_name": "python-django", "product_name": "Red Hat Ceph Storage 3"}, {"cpe": "cpe:/a:redhat:certifications:1::el7", "fix_state": "Not affected", "package_name": "python-django", "product_name": "Red Hat Certification for Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/a:redhat:openstack:10", "fix_state": "Will not fix", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 10 (Newton)"}, {"cpe": "cpe:/a:redhat:openstack:12", "fix_state": "Out of support scope", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 12 (Pike)"}, {"cpe": "cpe:/a:redhat:openstack:13", "fix_state": "Will not fix", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 13 (Queens)"}, {"cpe": "cpe:/a:redhat:openstack:14", "fix_state": "Out of support scope", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 14 (Rocky)"}, {"cpe": "cpe:/a:redhat:openstack:8", "fix_state": "Will not fix", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 8 (Liberty)"}, {"cpe": "cpe:/a:redhat:openstack-optools:8", "fix_state": "Will not fix", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 8 (Liberty) Operational Tools"}, {"cpe": "cpe:/a:redhat:openstack:9", "fix_state": "Will not fix", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 9 (Mitaka)"}, {"cpe": "cpe:/a:redhat:openstack-optools:9", "fix_state": "Will not fix", "package_name": "python-django", "product_name": "Red Hat OpenStack Platform 9 (Mitaka) Operational Tools"}, {"cpe": "cpe:/a:redhat:satellite:6", "fix_state": "Not affected", "package_name": "python-django", "product_name": "Red Hat Satellite 6"}, {"cpe": "cpe:/a:rhel_sam:1", "fix_state": "Will not fix", "package_name": "Django", "product_name": "Red Hat Subscription Asset Manager"}, {"cpe": "cpe:/a:redhat:rhui:3", "fix_state": "Not affected", "package_name": "python-django", "product_name": "Red Hat Update Infrastructure 3 for Cloud Providers"}], "public_date": "2018-08-01T14:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2018-14574\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-14574\nhttps://www.djangoproject.com/weblog/2018/aug/01/security-releases/"], "statement": "This issue did not affect the versions of python-django as shipped with Red Hat Update Infrastructure 3 as the vulnerable code was introduced in a newer version of the package.\nSubscription Asset Manager is now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates.\nAlthough Red Hat Satellite 6 contains the vulnerable component, it is not affected by this flaw since the condition to exploit the vulnerability cannot be satisfied.\nIn Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP python-django package.", "threat_severity": "Moderate"}