Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-38875
HistoryJul 09, 2024 - 12:00 a.m.

CVE-2024-38875

2024-07-0900:00:00
ubuntu.com
ubuntu.com
3
cve-2024-38875
denial-of-service
django.utils.html.urlize()
large number
brackets
upstream
affected
versions
maintenance
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.2

Confidence

Low

EPSS

0

Percentile

15.8%

An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7.
urlize and urlizetrunc were subject to a potential denial of service attack
via certain inputs with a very large number of brackets.

Notes

Author Note
alexmurray upstream advises that only versions 4.2, 5.0 and 5.1 (plus main development branch) are affected but it is likely earlier versions may also be affected but upstream do not mention this as they are no longer maintained by them
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchpython-django< 1:1.11.11-1ubuntu1.21+esm5UNKNOWN
ubuntu20.04noarchpython-django< 2:2.2.12-1ubuntu0.23UNKNOWN
ubuntu22.04noarchpython-django< 2:3.2.12-2ubuntu1.12UNKNOWN
ubuntu23.10noarchpython-django< 3:4.2.4-1ubuntu2.3UNKNOWN
ubuntu24.04noarchpython-django< 3:4.2.11-1ubuntu1.1UNKNOWN
ubuntu14.04noarchpython-django< anyUNKNOWN
ubuntu16.04noarchpython-django< anyUNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.2

Confidence

Low

EPSS

0

Percentile

15.8%