CVE-2018-7537 log
Source |
|
Severity | Medium |
Remote | Yes |
Type | Denial of service |
Description | If django.utils.text.Truncator’s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-649 | python-django, python2-django | 1.11.10-1 | 1.11.11-1 | Medium | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
06 Mar 2018 | ASA-201803-6 | AVG-649 | python2-django | Medium | denial of service |
06 Mar 2018 | ASA-201803-5 | AVG-649 | python-django | Medium | denial of service |
References |
---|
https://docs.djangoproject.com/en/dev/releases/1.11.11/ https://github.com/django/django/commit/97b7dd59bb8d6163239061e2022153c3415d146d |