CVE-2023-23969
Summary
| CVE | CVE-2023-23969 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-02-01 19:15:00 UTC |
| Updated | 2023-11-07 04:08:00 UTC |
| Description | In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 181534 Debian Security Update for python-django (DLA 3306-1)
- 181940 Debian Security Update for python-django (CVE-2023-23969)
- 199144 Ubuntu Security Notification for Django Vulnerability (USN-5837-1)
- 199485 Ubuntu Security Notification for Django Vulnerability (USN-5837-2)
- 241405 Red Hat Update for Satellite 6.13 (RHSA-2023:2097)
- 283945 Fedora Security Update for python (FEDORA-2023-8fed428c5e)
- 284167 Fedora Security Update for python (FEDORA-2023-a53ab7c969)
- 502921 Alpine Linux Security Update for py3-django
- 505800 Alpine Linux Security Update for py3-django
- 6000222 Debian Security Update for python-django (DSA 5465-1)
- 691049 Free Berkeley Software Distribution (FreeBSD) Security Update for django (c49a880d-a5bb-11ed-aab5-080027de9982)
- 960924 Rocky Linux Security Update for Satellite (RLSA-2023:2097)