Improper Validation of Specified Quantity in Input Affecting python-django package, versions <3:4.2.4-1ubuntu2


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.25% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2410-PYTHONDJANGO-8195676
  • published15 Oct 2024
  • disclosed3 Nov 2023

Introduced: 3 Nov 2023

CVE-2023-43665  (opens in a new tab)
CWE-1284  (opens in a new tab)

How to fix?

Upgrade Ubuntu:24.10 python-django to version 3:4.2.4-1ubuntu2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-django package and not the python-django package as distributed by Ubuntu. See How to fix? for Ubuntu:24.10 relevant fixed versions and status.

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.

CVSS Scores

version 3.1