CVE Vulnerabilities

CVE-2021-45115

Published: Jan 05, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.

Affected Software

NameVendorStart VersionEnd Version
DjangoDjangoproject2.2 (including)2.2.26 (excluding)
DjangoDjangoproject3.2 (including)3.2.11 (excluding)
DjangoDjangoproject4.0 (including)4.0.1 (excluding)
Red Hat Satellite 6.11 for RHEL 8RedHatpython-django-0:3.2.13-1.el8pc*
Red Hat Satellite 6.11 for RHEL 8RedHatpython-django-0:3.2.13-1.el8pc*
Python-djangoUbuntubionic*
Python-djangoUbuntudevel*
Python-djangoUbuntuesm-infra-legacy/trusty*
Python-djangoUbuntuesm-infra/bionic*
Python-djangoUbuntuesm-infra/focal*
Python-djangoUbuntuesm-infra/xenial*
Python-djangoUbuntufocal*
Python-djangoUbuntuhirsute*
Python-djangoUbuntuimpish*
Python-djangoUbuntujammy*
Python-djangoUbuntukinetic*
Python-djangoUbuntulunar*
Python-djangoUbuntumantic*
Python-djangoUbuntunoble*
Python-djangoUbuntuoracular*
Python-djangoUbuntuplucky*
Python-djangoUbuntuquesting*
Python-djangoUbuntutrusty/esm*

References