In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
References
Configurations
No configuration.
History
03 Jul 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Apr 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Apr 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Apr 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
15 Mar 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-15 20:15
Updated : 2024-07-03 01:50
NVD link : CVE-2024-27351
Mitre link : CVE-2024-27351
CVE.ORG link : CVE-2024-27351
JSON object : View
Products Affected
No product.
CWE
CWE-1333
Inefficient Regular Expression Complexity