7.5
CVE-2023-43665
- EPSS 1.45%
- Published 03.11.2023 05:15:30
- Last modified 21.11.2024 08:24:34
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
Data is provided by the National Vulnerability Database (NVD)
Djangoproject ≫ Django Version >= 3.2 < 3.2.22
Djangoproject ≫ Django Version >= 4.1 < 4.1.12
Djangoproject ≫ Django Version >= 4.2 < 4.2.6
Fedoraproject ≫ Fedora Version39
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.45% | 0.801 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-1284 Improper Validation of Specified Quantity in Input
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.