First published: Tue Feb 27 2018(Updated: )
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The `django.utils.html.urlize()` function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The `urlize()` function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Djangoproject Django | >=1.8<1.8.19 | |
Djangoproject Django | >=1.11<1.11.11 | |
Djangoproject Django | >=2.0<2.0.3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Openstack | =10 | |
Redhat Openstack | =13 | |
redhat/Django | <2.0.3 | 2.0.3 |
redhat/Django | <1.11.11 | 1.11.11 |
redhat/Django | <1.8.19 | 1.8.19 |
debian/python-django | 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:4.2.16-1 | |
pip/Django | >=1.8a1<1.8.19 | 1.8.19 |
pip/Django | >=1.11a1<1.11.11 | 1.11.11 |
pip/Django | >=2.0a1<2.0.3 | 2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7536 is a vulnerability in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19 that allows for catastrophic backtracking and can result in a denial of service attack.
CVE-2018-7536 has a severity rating of 5.3, which is considered medium.
To fix CVE-2018-7536, upgrade to Django 1.8.19, 1.11.11, or 2.0.3 depending on the version you are using.
You can find more information about CVE-2018-7536 on the CVE Mitre website and the Django security releases page.
The CWE for CVE-2018-7536 is CWE-185, which refers to a behavior that can expose sensitive information.