First published: Tue Jul 30 2019(Updated: )
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If `django.utils.text.Truncator`'s `chars()` and `words()` methods were passed the `html=True` argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The `chars()` and `words()` methods are used to implement the `truncatechars_htm`l and `truncatewords_html` template filters, which were thus vulnerable.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/1.7.11-1+deb8u6 | ||
debian/2:2.2.3-5 | ||
debian/python-django | 1:1.11.29-1~deb10u1 1:1.11.29-1+deb10u10 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:3.2.21-1 3:4.2.6-1 | |
redhat/python-django | <0:1.11.27-1.el7 | 0:1.11.27-1.el7 |
redhat/python-django | <0:2.1.11-1.el8 | 0:2.1.11-1.el8 |
Djangoproject Django | >=1.11<1.11.23 | |
Djangoproject Django | >=2.1<2.1.11 | |
Djangoproject Django | >=2.2<2.2.4 | |
openSUSE Leap | =15.1 | |
redhat/python-django | <1.11.23 | 1.11.23 |
redhat/python-django | <2.1.11 | 2.1.11 |
redhat/python-django | <2.2.4 | 2.2.4 |
pip/Django | >=2.2a1<2.2.4 | 2.2.4 |
pip/Django | >=2.1a1<2.1.11 | 2.1.11 |
pip/Django | >=1.11a1<1.11.23 | 1.11.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14232 is a vulnerability in Django versions 1.11.x, 2.1.x, and 2.2.x.
CVE-2019-14232 has a severity score of 7.5 (High).
Django versions 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4 are affected by CVE-2019-14232.
To fix CVE-2019-14232, upgrade to Django version 1.11.23, 2.1.11, or 2.2.4.
You can find more information about CVE-2019-14232 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2019-14232), the NVD website (https://nvd.nist.gov/vuln/detail/CVE-2019-14232), the Django website (https://www.djangoproject.com/weblog/2019/aug/01/security-releases/), and the Red Hat Bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1734405).