Improper Validation of Specified Quantity in Input Affecting python-django package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.25% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-PYTHONDJANGO-5932017
  • published5 Oct 2023
  • disclosed3 Nov 2023

Introduced: 5 Oct 2023

CVE-2023-43665  (opens in a new tab)
CWE-1284  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 python-django.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-django package and not the python-django package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

CVSS Scores

version 3.1