First published: Tue Feb 27 2018(Updated: )
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django | >=1.8<1.8.19 | 1.8.19 |
pip/django | >=1.11<1.11.11 | 1.11.11 |
pip/django | >=2.0<2.0.3 | 2.0.3 |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Djangoproject Django | >=1.8<1.8.19 | |
Djangoproject Django | >=1.11<1.11.11 | |
Djangoproject Django | >=2.0<2.0.3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
redhat/Django | <2.0.3 | 2.0.3 |
redhat/Django | <1.11.11 | 1.11.11 |
redhat/Django | <1.8.19 | 1.8.19 |
debian/python-django | 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:4.2.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7537 is a vulnerability in Django versions 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19.
CVE-2018-7537 has a severity rating of 5.3 (Medium).
To fix the CVE-2018-7537 vulnerability, upgrade your Django installation to version 2.0.3, 1.11.11, or 1.8.19.
More information about CVE-2018-7537 can be found on the MITRE website (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7537) and the Django website (https://www.djangoproject.com/weblog/2018/mar/06/security-releases/).
Yes, there is a fix available for CVE-2018-7537. Upgrade your Django installation to version 2.0.3, 1.11.11, or 1.8.19.