CVE Vulnerabilities

CVE-2020-15225

Incorrect Conversion between Numeric Types

Published: Apr 29, 2021 | Modified: Nov 07, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
6.5 LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

django-filter is a generic system for filtering Django QuerySets based on user selections. In django-filter before version 2.4.0, automatically generated NumberFilter instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a MaxValueValidator with a a default limit_value of 1e50 to the form field used by NumberFilter instances. In addition, NumberFilter implements the new get_max_validator() which should return a configured validator instance to customise the limit, or else None to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.

Weakness

When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.

Affected Software

Name Vendor Start Version End Version
Django-filter Django-filter_project * 2.4.0 (excluding)
Django-filter Ubuntu bionic *
Django-filter Ubuntu groovy *
Django-filter Ubuntu hirsute *
Django-filter Ubuntu impish *
Django-filter Ubuntu kinetic *
Django-filter Ubuntu lunar *
Django-filter Ubuntu mantic *
Django-filter Ubuntu trusty *
Django-filter Ubuntu xenial *

Potential Mitigations

References