First published: Fri Jul 05 2024(Updated: )
django.utils.html.urlize() was subject to a potential denial-of-service attack via certain inputs with a very large number of brackets. Affected versions ================= * Django main development branch * Django 5.1 * Django 5.0 * Django 4.2
Affected Software | Affected Version | How to fix |
---|---|---|
Django | <=5.1 | |
Django | >=4.2<=5.0 | |
Django | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in REDHAT-BUG-2295935 poses a potential denial-of-service risk due to excessive bracket handling in Django.
To mitigate the vulnerability REDHAT-BUG-2295935, upgrade to Django versions 5.1 or later.
Affected versions in REDHAT-BUG-2295935 include Django 4.2, 5.0, and 5.1.
REDHAT-BUG-2295935 exposes Django to potential denial-of-service attacks through specially crafted inputs.
As of now, there are no publicly known exploits specifically targeting REDHAT-BUG-2295935.