First published: Tue Oct 04 2022(Updated: )
A denial of service flaw was discovered in Django. This issue occurs when incorrectly handling certain internationalized URLs. A malicious attacker could use this issue to cause a crash, resulting in a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django | >=4.1<4.1.2 | 4.1.2 |
pip/django | >=4.0<4.0.8 | 4.0.8 |
pip/django | >=3.2<3.2.16 | 3.2.16 |
redhat/python-django | <0:3.2.18-1.el8 | 0:3.2.18-1.el8 |
redhat/python-django | <0:3.2.16-1.0.1.el8 | 0:3.2.16-1.0.1.el8 |
Djangoproject Django | >=3.2<3.2.16 | |
Djangoproject Django | >=4.0<4.0.8 | |
Djangoproject Django | >=4.1<4.1.2 | |
debian/python-django | 1:1.11.29-1~deb10u1 1:1.11.29-1+deb10u10 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:3.2.21-1 3:4.2.8-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-41323 is high.
To fix CVE-2022-41323, update Django to version 4.1.2, 4.0.8, or 3.2.16 depending on your current version.
CVE-2022-41323 can be exploited by a malicious attacker to cause a crash, resulting in a denial of service.
You can find more information about CVE-2022-41323 on the NIST NVD website, Django's GitHub repository, and the Django website.
The CWE ID of CVE-2022-41323 is 400.