CVE-2023-23969: Django contains Uncontrolled Resource Consumption via cached header
(updated )
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
References
- docs.djangoproject.com/en/4.1/releases/security
- github.com/advisories/GHSA-q2jf-h9jm-m7p4
- github.com/django/django
- github.com/django/django/commit/4452642f193533e288a52c02efb5bbc766a68f95
- github.com/django/django/commit/9d7bd5a56b1ce0576e8e07a8001373576d277942
- github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-12.yaml
- groups.google.com/forum/
- lists.debian.org/debian-lts-announce/2023/02/msg00000.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI
- nvd.nist.gov/vuln/detail/CVE-2023-23969
- security.netapp.com/advisory/ntap-20230302-0007
- www.djangoproject.com/weblog/2023/feb/01/security-releases
Detect and mitigate CVE-2023-23969 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →