Описание
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
Отчет
This issue affects the versions of django as shipped with Red Hat Subscription Asset Manager. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Ceph Storage 1.3 | python-django | Affected | ||
Red Hat Ceph Storage 2 | python-django | Affected | ||
Red Hat Ceph Storage 3 | python-django | Affected | ||
Red Hat Enterprise Linux OpenStack Platform 6 (Juno) | python-django | Will not fix | ||
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) | python-django | Will not fix | ||
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) Operational Tools | python-django | Will not fix | ||
Red Hat OpenStack Platform 10 (Newton) | python-django | Will not fix | ||
Red Hat OpenStack Platform 11 (Ocata) | python-django | Will not fix | ||
Red Hat OpenStack Platform 12 (Pike) | python-django | Will not fix | ||
Red Hat OpenStack Platform 13 (Queens) | python-django | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.1 ...
Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters
Уязвимость функции django.utils.html.urlize и методов chars и words объектов django.utils.text.Truncator программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5.3 Medium
CVSS3