Lucene search

K
ubuntuUbuntuUSN-6414-2
HistoryOct 04, 2023 - 12:00 a.m.

Django vulnerabilities

2023-10-0400:00:00
ubuntu.com
24
ubuntu 18.04 esm
python web development framework
cve-2023-43665
cve-2023-41164
denial of service
django
uri handling

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.4%

Releases

  • Ubuntu 18.04 ESM

Packages

  • python-django - High-level Python web development framework

Details

USN-6414-1 and USN-6378-1 fixed CVE-2023-43665 and CVE-2023-41164 in Django,
respectively. This update provides the corresponding update for Ubuntu 18.04 LTS.

Original advisory details:

Wenchao Li discovered that the Django Truncator function incorrectly
handled very long HTML input. A remote attacker could possibly use this
issue to cause Django to consume resources, leading to a denial of service.

It was discovered that Django incorrectly handled certain URIs with a very
large number of Unicode characters. A remote attacker could possibly use
this issue to cause Django to consume resources or crash, leading to a
denial of service.

OSVersionArchitecturePackageVersionFilename
Ubuntu18.04noarchpython3-django< 1:1.11.11-1ubuntu1.21+esm2UNKNOWN
Ubuntu18.04noarchpython-django< 1:1.11.11-1ubuntu1.21UNKNOWN
Ubuntu18.04noarchpython-django-common< 1:1.11.11-1ubuntu1.21UNKNOWN
Ubuntu18.04noarchpython-django-doc< 1:1.11.11-1ubuntu1.21UNKNOWN
Ubuntu18.04noarchpython3-django< 1:1.11.11-1ubuntu1.21UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.4%