Improper Validation of Specified Quantity in Input Affecting python-django package, versions <2:2.2.12-1ubuntu0.20


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.21% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2004-PYTHONDJANGO-5932062
  • published5 Oct 2023
  • disclosed3 Nov 2023

Introduced: 5 Oct 2023

CVE-2023-43665  (opens in a new tab)
CWE-1284  (opens in a new tab)

How to fix?

Upgrade Ubuntu:20.04 python-django to version 2:2.2.12-1ubuntu0.20 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-django package and not the python-django package as distributed by Ubuntu. See How to fix? for Ubuntu:20.04 relevant fixed versions and status.

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

CVSS Scores

version 3.1