Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-7537

Опубликовано: 06 мар. 2018
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

Отчет

This issue affects the versions of django as shipped with Red Hat Subscription Asset Manager. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 1.3python-djangoAffected
Red Hat Ceph Storage 2python-djangoAffected
Red Hat Ceph Storage 3python-djangoAffected
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)python-djangoWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)python-djangoWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) Operational Toolspython-djangoWill not fix
Red Hat OpenStack Platform 10 (Newton)python-djangoWill not fix
Red Hat OpenStack Platform 11 (Ocata)python-djangoWill not fix
Red Hat OpenStack Platform 12 (Pike)python-djangoWill not fix
Red Hat OpenStack Platform 13 (Queens)python-djangoWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1549779django: Catastrophic backtracking in regular expressions via 'truncatechars_html' and 'truncatewords_html'

EPSS

Процентиль: 83%
0.02064
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
nvd
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.

CVSS3: 5.3
debian
больше 7 лет назад

An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.1 ...

CVSS3: 5.3
github
больше 6 лет назад

Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters

CVSS3: 5.3
fstec
больше 7 лет назад

Уязвимость функции django.utils.html.urlize и методов chars и words объектов django.utils.text.Truncator программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 83%
0.02064
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2018-7537