An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Django | Djangoproject | 4.2.0 (including) | 4.2.16 (excluding) |
Django | Djangoproject | 5.0 (including) | 5.0.9 (excluding) |
Django | Djangoproject | 5.1 (including) | 5.1 (including) |
Red Hat Ansible Automation Platform 2.5 for RHEL 8 | RedHat | automation-controller-0:4.6.2-1.el8ap | * |
Red Hat Ansible Automation Platform 2.5 for RHEL 9 | RedHat | automation-controller-0:4.6.2-1.el9ap | * |
Python-django | Ubuntu | devel | * |
Python-django | Ubuntu | esm-infra/bionic | * |
Python-django | Ubuntu | focal | * |
Python-django | Ubuntu | jammy | * |
Python-django | Ubuntu | noble | * |
Python-django | Ubuntu | oracular | * |
Python-django | Ubuntu | trusty/esm | * |