CVE-2019-14232: Improper Input Validation
(updated )
A call to the methods chars()
or words() in
django.utils.text.Truncatorwith the argument
html=Trueevaluates certain inputs extremely slowly due to a catastrophic backtracking vulnerability in a regular expression. The
chars()and
words()methods are used to implement the
truncatechars_htmland
truncatewords_html` template filters, which were thus vulnerable.
References
Detect and mitigate CVE-2019-14232 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →