An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Ansible Automation Platform 2.4 for RHEL 8 | RedHat | python3x-django-0:4.2.15-1.el8ap | * |
Red Hat Ansible Automation Platform 2.4 for RHEL 9 | RedHat | python-django-0:4.2.15-1.el9ap | * |
Red Hat OpenStack Services on OpenShift 18.0 | RedHat | python-django-0:3.2.12-8.el9ost | * |
Red Hat Satellite 6.16 for RHEL 8 | RedHat | python-django-0:4.2.16-1.el8pc | * |
Red Hat Satellite 6.16 for RHEL 8 | RedHat | python-django-0:4.2.16-1.el8pc | * |
Red Hat Satellite 6.16 for RHEL 9 | RedHat | python-django-0:4.2.16-1.el9pc | * |
Red Hat Satellite 6.16 for RHEL 9 | RedHat | python-django-0:4.2.16-1.el9pc | * |
Python-django | Ubuntu | esm-infra/bionic | * |
Python-django | Ubuntu | focal | * |
Python-django | Ubuntu | jammy | * |
Python-django | Ubuntu | mantic | * |
Python-django | Ubuntu | noble | * |
Python-django | Ubuntu | trusty/esm | * |