CVE-2023-43665
Summary
| CVE | CVE-2023-43665 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-11-03 05:15:00 UTC |
| Updated | 2023-11-13 15:29:00 UTC |
| Description | In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232. |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 199805 Ubuntu Security Notification for Django Vulnerabilities (USN-6414-2)
- 199806 Ubuntu Security Notification for Django Vulnerability (USN-6414-1)
- 243144 Red Hat Update for Satellite 6.14.3 (RHSA-2024:1536)
- 284628 Fedora Security Update for python (FEDORA-2023-cc023fabb7)
- 284653 Fedora Security Update for python (FEDORA-2023-9d36d373f1)
- 285198 Fedora Security Update for python (FEDORA-2023-a67af7d8f4)
- 296105 Oracle Solaris 11.4 Support Repository Update (SRU) 63.157.1 Missing (CPUOCT2023)
- 503371 Alpine Linux Security Update for py3-django
- 506175 Alpine Linux Security Update for py3-django
- 691320 Free Berkeley Software Distribution (FreeBSD) Security Update for django (4f254817-6318-11ee-b2ff-080027de9982)
- 995839 Python (Pip) Security Update for django (GHSA-h8gc-pgj2-vjm3)