Lucene search

K
githubGitHub Advisory DatabaseGHSA-795C-9XPC-XW6G
HistoryAug 07, 2024 - 3:30 p.m.

Django vulnerable to a denial-of-service attack

2024-08-0715:30:42
CWE-130
GitHub Advisory Database
github.com
4
django 5.0.8
django 4.2.15
urlize
urlizetrunc
template filters
denial-of-service
attack
large inputs
specific sequence
characters
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

21.9%

An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.

Affected configurations

Vulners
Node
djangoRange<4.2.15
OR
djangoRange<5.0.8
VendorProductVersionCPE
*django*cpe:2.3:a:*:django:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

21.9%