Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7537

Опубликовано: 09 мар. 2018
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed1:1.11.11-1package

Примечания

  • https://www.djangoproject.com/weblog/2018/mar/06/security-releases/

  • Patch https://github.com/django/django/commit/a91436360b79a6ff995c3e5018bcc666dfaf1539

EPSS

Процентиль: 83%
0.02064
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
redhat
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
nvd
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
github
больше 6 лет назад

Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters

CVSS3: 5.3
fstec
больше 7 лет назад

Уязвимость функции django.utils.html.urlize и методов chars и words объектов django.utils.text.Truncator программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 83%
0.02064
Низкий