Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2f9x-5v75-3qv4

Опубликовано: 04 янв. 2019
Источник: github
Github: Прошло ревью
CVSS4: 2.7
CVSS3: 5.3

Описание

Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

Пакеты

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 2.0, < 2.0.3

2.0.3

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 1.11, < 1.11.11

1.11.11

Наименование

Django

pip
Затронутые версииВерсия исправления

>= 1.8, < 1.8.19

1.8.19

EPSS

Процентиль: 83%
0.02064
Низкий

2.7 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-185

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
redhat
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
nvd
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
debian
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.1 ...

CVSS3: 5.3
fstec
больше 7 лет назад

Уязвимость функции django.utils.html.urlize и методов chars и words объектов django.utils.text.Truncator программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 83%
0.02064
Низкий

2.7 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-185