CVE-2009-3695: Django Regex Algorithmic Complexity Causes Denial of Service
(updated )
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
References
- exchange.xforce.ibmcloud.com/vulnerabilities/53727
- github.com/advisories/GHSA-p6m5-h7pp-v2x5
- github.com/django/django
- github.com/django/django/commit/594a28a9044120bed58671dde8a805c9e0f6c79a
- github.com/django/django/commit/e3e992e18b368fcd56aabafc1b5bf80a6e11b495
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2009-4.yaml
- nvd.nist.gov/vuln/detail/CVE-2009-3695
- web.archive.org/web/20091013093057/http://secunia.com/advisories/36968
- web.archive.org/web/20091017070244/http://secunia.com/advisories/36948
- web.archive.org/web/20200228171918/http://www.securityfocus.com/bid/36655
Detect and mitigate CVE-2009-3695 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →