Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-43665

Опубликовано: 04 окт. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

An inefficient regular expression complexity was found in Django. The text truncator regular expressions exhibit linear backtracking complexity, which can be slow, leading to a potential denial of service, given certain HTML inputs.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certification for Red Hat Enterprise Linux 7python-djangoAffected
Red Hat OpenStack Platform 16.1python-django20Out of support scope
Red Hat OpenStack Platform 16.2python-django20Out of support scope
Red Hat OpenStack Platform 17.0python-djangoNot affected
Red Hat OpenStack Platform 17.1python-djangoNot affected
Red Hat OpenStack Platform 18.0python-djangoAffected
Red Hat Storage 3python-djangoAffected
Red Hat Ansible Automation Platform 2.4 for RHEL 8python3x-djangoFixedRHSA-2023:575816.10.2023
Red Hat Ansible Automation Platform 2.4 for RHEL 8automation-controllerFixedRHSA-2023:615830.10.2023
Red Hat Ansible Automation Platform 2.4 for RHEL 9python-djangoFixedRHSA-2023:575816.10.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2241046python-django: Denial-of-service possibility in django.utils.text.Truncator

EPSS

Процентиль: 82%
0.01905
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

CVSS3: 7.5
nvd
больше 1 года назад

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

CVSS3: 7.5
debian
больше 1 года назад

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, ...

suse-cvrf
больше 1 года назад

Security update for python-Django1

suse-cvrf
больше 1 года назад

Security update for python-Django1

EPSS

Процентиль: 82%
0.01905
Низкий

7.5 High

CVSS3