CVE-2023-43665: Django Denial-of-service in django.utils.text.Truncator
(updated )
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
References
- docs.djangoproject.com/en/4.2/releases/security
- github.com/advisories/GHSA-h8gc-pgj2-vjm3
- github.com/django/django
- github.com/django/django/commit/be9c27c4d18c2e6a5be8af4e53c0797440794473
- github.com/django/django/commit/c7b7024742250414e426ad49fb80db943e7ba4e8
- github.com/django/django/commit/ccdade1a0262537868d7ca64374de3d957ca50c5
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-226.yaml
- groups.google.com/forum/
- groups.google.com/forum/
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU
- nvd.nist.gov/vuln/detail/CVE-2023-43665
- security.netapp.com/advisory/ntap-20231221-0001
- www.djangoproject.com/weblog/2023/oct/04/security-releases
Detect and mitigate CVE-2023-43665 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →