First published: Tue Oct 30 2007(Updated: )
The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | =0.91.0 | 0.91.1 |
pip/Django | =0.96.0 | 0.96.1 |
pip/Django | >=0.95<0.95.2 | 0.95.2 |
Django | =0.91 | |
Django | =0.95.1 | |
Django | =0.96 | |
Django | =0.95 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5712 is rated as a high vulnerability due to its ability to facilitate denial of service attacks through memory consumption.
To mitigate CVE-2007-5712, upgrade to Django version 0.91.1, 0.95.2, or 0.96.1.
CVE-2007-5712 affects Django versions 0.91, 0.95, 0.95.1, and 0.96.
Yes, CVE-2007-5712 can be exploited remotely without the need for authentication by sending multiple large HTTP requests.
Symptoms of an attack exploiting CVE-2007-5712 may include significant slowdowns or unresponsiveness of the affected Django application due to memory exhaustion.