CVE-2023-43665

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
VendorProductVersion
djangoprojectdjango
3.2 ≤
𝑥
< 3.2.22
djangoprojectdjango
4.1 ≤
𝑥
< 4.1.12
djangoprojectdjango
4.2 ≤
𝑥
< 4.2.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-django
bullseye
postponed
bookworm
postponed
buster
postponed
bullseye (security)
vulnerable
bookworm (security)
vulnerable
trixie
3:4.2.16-1
fixed
sid
3:4.2.17-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-django
oracular
Fixed 3:4.2.4-1ubuntu2
released
noble
Fixed 3:4.2.4-1ubuntu2
released
mantic
Fixed 3:4.2.4-1ubuntu2
released
lunar
Fixed 3:3.2.18-1ubuntu0.5
released
jammy
Fixed 2:3.2.12-2ubuntu1.9
released
focal
Fixed 2:2.2.12-1ubuntu0.20
released
bionic
Fixed 1:1.11.11-1ubuntu1.21+esm2
released
xenial
needs-triage
trusty
ignored