CVE Vulnerabilities

CVE-2024-27351

Inefficient Regular Expression Complexity

Published: Mar 15, 2024 | Modified: Jul 03, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

Name Vendor Start Version End Version
Red Hat Ansible Automation Platform 2.4 for RHEL 8 RedHat python3x-django-0:4.2.11-1.el8ap *
Red Hat Ansible Automation Platform 2.4 for RHEL 8 RedHat automation-controller-0:4.5.7-1.el8ap *
Red Hat Ansible Automation Platform 2.4 for RHEL 9 RedHat python-django-0:4.2.11-1.el9ap *
Red Hat Ansible Automation Platform 2.4 for RHEL 9 RedHat automation-controller-0:4.5.7-1.el9ap *
Red Hat Satellite 6.15 for RHEL 8 RedHat python-django-0:4.2.14-1.el8pc *
Red Hat Satellite 6.15 for RHEL 8 RedHat python-django-0:4.2.14-1.el8pc *
RHUI 4 for RHEL 8 RedHat python-django-0:4.2.11-1.el8ui *
Python-django Ubuntu bionic *
Python-django Ubuntu devel *
Python-django Ubuntu esm-infra/bionic *
Python-django Ubuntu focal *
Python-django Ubuntu jammy *
Python-django Ubuntu mantic *
Python-django Ubuntu noble *
Python-django Ubuntu oracular *
Python-django Ubuntu trusty *
Python-django Ubuntu trusty/esm *
Python-django Ubuntu upstream *
Python-django Ubuntu xenial *

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References