First published: Tue Jul 30 2019(Updated: )
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-django | 1:1.11.29-1~deb10u1 1:1.11.29-1+deb10u10 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:3.2.21-1 3:4.2.6-1 | |
redhat/python-django | <0:1.11.27-1.el7 | 0:1.11.27-1.el7 |
redhat/python-django | <0:2.1.11-1.el8 | 0:2.1.11-1.el8 |
redhat/python-django | <1.11.23 | 1.11.23 |
redhat/python-django | <2.1.11 | 2.1.11 |
redhat/python-django | <2.2.4 | 2.2.4 |
pip/Django | >=2.2a1<2.2.4 | 2.2.4 |
pip/Django | >=2.1a1<2.1.11 | 2.1.11 |
pip/Django | >=1.11a1<1.11.23 | 1.11.23 |
djangoproject Django | >=1.11<1.11.23 | |
djangoproject Django | >=2.1<2.1.11 | |
djangoproject Django | >=2.2<2.2.4 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14233 is a vulnerability in Django versions 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4.
CVE-2019-14233 has a severity rating of 7.5 (high).
CVE-2019-14233 affects Django by causing the django.utils.html.strip_tags function to be extremely slow in evaluating certain inputs containing large sequences of nested incomplete HTML entities.
The affected versions of Django are 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4.
To fix CVE-2019-14233, upgrade Django to version 1.11.23, 2.1.11, or 2.2.4, depending on the version you are currently using.