First published: Wed Sep 27 2023(Updated: )
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/python-django | <4.2.6<4.1.12<3.2.22 | 4.2.6 4.1.12 3.2.22 |
ubuntu/python-django | <2:2.2.12-1ubuntu0.20 | 2:2.2.12-1ubuntu0.20 |
ubuntu/python-django | <2:3.2.12-2ubuntu1.9 | 2:3.2.12-2ubuntu1.9 |
ubuntu/python-django | <3:3.2.18-1ubuntu0.5 | 3:3.2.18-1ubuntu0.5 |
ubuntu/python-django | <1:1.11.11-1ubuntu1.21+ | 1:1.11.11-1ubuntu1.21+ |
ubuntu/python-django | <3:4.2.4-1ubuntu2 | 3:4.2.4-1ubuntu2 |
debian/python-django | <=1:1.11.29-1~deb10u1<=1:1.11.29-1+deb10u11<=2:2.2.28-1~deb11u2<=3:3.2.19-1+deb12u1 | 3:4.2.11-1 |
redhat/python-django | <3.2.22 | 3.2.22 |
redhat/python-django | <4.1.12 | 4.1.12 |
redhat/python-django | <4.2.6 | 4.2.6 |
Djangoproject Django | >=3.2<3.2.22 | |
Djangoproject Django | >=4.1<4.1.12 | |
Djangoproject Django | >=4.2<4.2.6 | |
Fedoraproject Fedora | =39 | |
pip/Django | >=4.2a1<4.2.6 | 4.2.6 |
pip/Django | >=4.1a1<4.1.12 | 4.1.12 |
pip/Django | >=3.2a1<3.2.22 | 3.2.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2023-43665.
The title of this vulnerability is "Django: CVE-2023-43665: Denial-of-service possibility in django.utils.text.Truncator".
The description of this vulnerability is "Denial-of-service possibility in django.utils.text.Truncator".
The affected software is python-django version 4.2.6, 4.1.12, and 3.2.22 on Ubuntu, version 2:2.2.12-1ubuntu0.20 on Ubuntu Focal, version 2:3.2.12-2ubuntu1.9 on Ubuntu Jammy, version 3:3.2.18-1ubuntu0.5 on Ubuntu Lunar, and version 1:1.11.11-1ubuntu1.21+ on Ubuntu Bionic.
To fix this vulnerability, update your python-django package to the recommended version provided by your operating system vendor or follow the instructions in the official security release from Django.