First published: Tue Jan 04 2022(Updated: )
:class:`.UserAttributeSimilarityValidator` incurred significant overhead evaluating submitted password that were artificially large in relative to the comparison values. On the assumption that access to user registration was unrestricted this provided a potential vector for a denial-of-service attack. References: <a href="https://www.djangoproject.com/weblog/2022/jan/04/security-releases/">https://www.djangoproject.com/weblog/2022/jan/04/security-releases/</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Django | >=2.2<2.2.26 | |
Djangoproject Django | >=3.2<3.2.11 | |
Djangoproject Django | >=4.0<4.0.1 | |
Fedoraproject Fedora | =35 | |
redhat/Django | <4.0.1 | 4.0.1 |
redhat/Django | <3.2.11 | 3.2.11 |
redhat/Django | <2.2.26 | 2.2.26 |
pip/Django | >=4.0a1<4.0.1 | 4.0.1 |
pip/Django | >=3.2a1<3.2.11 | 3.2.11 |
pip/Django | >=2.2a1<2.2.26 | 2.2.26 |
>=2.2<2.2.26 | ||
>=3.2<3.2.11 | ||
>=4.0<4.0.1 | ||
=35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-45115 is high with a severity value of 7.5.
Django versions 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 are affected by CVE-2021-45115.
The remedy for CVE-2021-45115 is to update Django to version 4.0.1, 3.2.11, or 2.2.26.
You can find more information about CVE-2021-45115 on the Django website and the Red Hat Bugzilla.
CVE-2021-45115 is associated with CWE-400 (Uncontrolled Resource Consumption).