CVE-2009-3695 Affecting python-django package, versions <1.1.1-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-PYTHONDJANGO-361115
- published 13 Oct 2009
- disclosed 13 Oct 2009
Introduced: 13 Oct 2009
CVE-2009-3695 Open this link in a new tabHow to fix?
Upgrade Debian:10
python-django
to version 1.1.1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-django
package and not the python-django
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
References
- ADVISORY
- Debian Bug Report
- Debian Security Advisory
- http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/
- http://www.djangoproject.com/weblog/2009/oct/09/security/
- http://www.vupen.com/english/advisories/2009/2871
- http://xforce.iss.net/xforce/xfdb/53727
- OSS security Advisory
- Secunia Advisory
- Secunia Advisory
- Security Focus
- X-force Vulnerability Report