Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-43665

Опубликовано: 03 нояб. 2023
Источник: debian
EPSS Низкий

Описание

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-djangofixed3:4.2.6-1package
python-djangopostponedbookwormpackage
python-djangopostponedbusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2023/10/04/6

  • https://www.djangoproject.com/weblog/2023/oct/04/security-releases/

  • https://github.com/django/django/commit/17b51094d778b421bb2b3aae0c270894b050455d (main)

  • https://github.com/django/django/commit/be9c27c4d18c2e6a5be8af4e53c0797440794473 (4.2.6)

  • https://github.com/django/django/commit/ccdade1a0262537868d7ca64374de3d957ca50c5 (3.2.22)

EPSS

Процентиль: 79%
0.01381
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

CVSS3: 7.5
redhat
почти 2 года назад

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

CVSS3: 7.5
nvd
почти 2 года назад

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

suse-cvrf
больше 1 года назад

Security update for python-Django1

suse-cvrf
больше 1 года назад

Security update for python-Django1

EPSS

Процентиль: 79%
0.01381
Низкий