CVE-2023-46695: Django potential denial of service vulnerability in UsernameField on Windows
(updated )
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
References
- docs.djangoproject.com/en/4.2/releases/security
- github.com/advisories/GHSA-qmf9-6jqf-j8fq
- github.com/django/django
- github.com/django/django/commit/048a9ebb6ea468426cb4e57c71572cbbd975517f
- github.com/django/django/commit/4965bfdde2e5a5c883685019e57d123a3368a75e
- github.com/django/django/commit/f9a7fb8466a7ba4857eaf930099b5258f3eafb2b
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-222.yaml
- groups.google.com/forum/
- groups.google.com/forum/
- nvd.nist.gov/vuln/detail/CVE-2023-46695
- security.netapp.com/advisory/ntap-20231214-0001
- www.djangoproject.com/weblog/2023/nov/01/security-releases
Detect and mitigate CVE-2023-46695 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →