CVE-2012-3443: Django Image Field Vulnerable to Image Decompression Bombs
(updated )
The django.forms.ImageField
class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
References
- github.com/advisories/GHSA-59w8-4wm2-4xw8
- github.com/django/django
- github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155
- github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-3.yaml
- nvd.nist.gov/vuln/detail/CVE-2012-3443
- www.debian.org/security/2012/dsa-2529
- www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
- www.mandriva.com/security/advisories?name=MDVSA-2012:143
- www.openwall.com/lists/oss-security/2012/07/31/1
- www.openwall.com/lists/oss-security/2012/07/31/2
- www.ubuntu.com/usn/USN-1560-1
Detect and mitigate CVE-2012-3443 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →