In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Ansible Automation Platform 2.4 for RHEL 8 | RedHat | python3x-django-0:4.2.11-1.el8ap | * |
Red Hat Ansible Automation Platform 2.4 for RHEL 8 | RedHat | automation-controller-0:4.5.7-1.el8ap | * |
Red Hat Ansible Automation Platform 2.4 for RHEL 9 | RedHat | python-django-0:4.2.11-1.el9ap | * |
Red Hat Ansible Automation Platform 2.4 for RHEL 9 | RedHat | automation-controller-0:4.5.7-1.el9ap | * |
Red Hat Satellite 6.15 for RHEL 8 | RedHat | python-django-0:4.2.14-1.el8pc | * |
Red Hat Satellite 6.15 for RHEL 8 | RedHat | python-django-0:4.2.14-1.el8pc | * |
RHUI 4 for RHEL 8 | RedHat | python-django-0:4.2.11-1.el8ui | * |
Python-django | Ubuntu | bionic | * |
Python-django | Ubuntu | devel | * |
Python-django | Ubuntu | esm-infra/bionic | * |
Python-django | Ubuntu | focal | * |
Python-django | Ubuntu | jammy | * |
Python-django | Ubuntu | mantic | * |
Python-django | Ubuntu | noble | * |
Python-django | Ubuntu | oracular | * |
Python-django | Ubuntu | trusty | * |
Python-django | Ubuntu | trusty/esm | * |
Python-django | Ubuntu | upstream | * |
Python-django | Ubuntu | xenial | * |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.