First published: Wed Oct 19 2022(Updated: )
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. <a href="https://docs.djangoproject.com/en/4.0/releases/security/">https://docs.djangoproject.com/en/4.0/releases/security/</a> <a href="https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924">https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924</a> <a href="https://www.djangoproject.com/weblog/2022/oct/04/security-releases/">https://www.djangoproject.com/weblog/2022/oct/04/security-releases/</a> <a href="https://groups.google.com/forum/#!forum/django-announce">https://groups.google.com/forum/#!forum/django-announce</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Django | <3.2.16 | |
Django | <4.0.8 | |
Django | <4.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-2136130 has a severity rating that indicates a potential denial of service attack.
To fix REDHAT-BUG-2136130, upgrade Django to version 3.2.16 or later, 4.0.8 or later, or 4.1.2 or later.
Versions of Django prior to 3.2.16, 4.0.8, and 4.1.2 are affected by REDHAT-BUG-2136130.
REDHAT-BUG-2136130 allows for a potential denial of service attack via internationalized URLs.
There is no official workaround for REDHAT-BUG-2136130, and upgrading is the recommended solution.