CVE-2015-2316: Django Denial-of-service possibility with strip_tags
(updated )
The utils.html.strip_tags
function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.
References
- github.com/advisories/GHSA-j3j3-jrfh-cm2w
- github.com/django/django
- github.com/django/django/commit/5447709a571cd5d95971f1d5d21d4a7edcf85bbd
- github.com/django/django/commit/b6b3cb9899214a23ebb0f4ebf0e0b300b0ee524f
- github.com/django/django/commit/e63363f8e075fa8d66326ad6a1cc3391cc95cd97
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2015-18.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-2316
- web.archive.org/web/20200229033201/http://www.securityfocus.com/bid/73322
- www.djangoproject.com/weblog/2015/mar/18/security-releases
Detect and mitigate CVE-2015-2316 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →