### [CVE-2017-12794](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12794) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/CLincat/vulcat - https://github.com/NCSU-DANCE-Research-Group/CDL - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/gnarkill78/CSA_S2_2024 - https://github.com/hktalent/bug-bounty - https://github.com/hxysaury/saury-vulnhub - https://github.com/kenuosec/youzai - https://github.com/q99266/saury-vulnhub - https://github.com/qian-shen/youzai - https://github.com/reph0r/poc-exp - https://github.com/reph0r/poc-exp-tools - https://github.com/t0m4too/t0m4to