CVE-2023-43665Improper Validation of Specified Quantity in Input in Django

Severity
7.5HIGHNVD
EPSS
2.2%
top 15.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 3
Latest updateApr 28

Description

In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-1

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDdjangoproject/django3.23.2.22+2
PyPIdjangoproject/django3.2a13.2.22+2

Also affects: Fedora 39

Patches

🔴Vulnerability Details

6
GHSA
Regular expression denial-of-service in Django2024-03-15
OSV
CVE-2023-43665: In Django 32023-11-03
CVEList
CVE-2023-43665: In Django 32023-11-03
GHSA
Django Denial-of-service in django.utils.text.Truncator2023-11-03
OSV
Django Denial-of-service in django.utils.text.Truncator2023-11-03

📋Vendor Advisories

5
Red Hat
python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words()2024-03-04
Ubuntu
Django vulnerabilities2023-10-04
Ubuntu
Django vulnerability2023-10-04
Red Hat
python-django: Denial-of-service possibility in django.utils.text.Truncator2023-10-04
Debian
CVE-2023-43665: python-django - In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django...2023

💬Community

1
HackerOne
CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()2024-04-28
CVE-2023-43665 — Djangoproject Django vulnerability | cvebase