CVE-2023-41164: Improper Neutralization
(updated )
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
References
- docs.djangoproject.com/en/4.2/releases/security/
- github.com/advisories/GHSA-7h4p-27mh-hmrw
- github.com/django/django/commit/6f030b1149bd8fa4ba90452e77cb3edc095ce54e
- github.com/django/django/commit/9c51b4dcfa0cefcb48231f4d71cafa80821f87b9
- github.com/django/django/commit/ba00bc5ec6a7eff5e08be438f7b5b0e9574e8ff0
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-225.yaml
- groups.google.com/forum/
- nvd.nist.gov/vuln/detail/CVE-2023-41164
- www.djangoproject.com/weblog/2023/sep/04/security-releases/
Detect and mitigate CVE-2023-41164 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →