CVE-2024-27351

In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/03/04/1
https://docs.djangoproject.com/en/5.0/releases/security/
https://groups.google.com/forum/#%21forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
https://www.djangoproject.com/weblog/2024/mar/04/security-releases/
http://www.openwall.com/lists/oss-security/2024/03/04/1
https://docs.djangoproject.com/en/5.0/releases/security/
https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521
https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e
https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a
https://groups.google.com/forum/#%21forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
https://www.djangoproject.com/weblog/2024/mar/04/security-releases/
Configurations

No configuration.

History

No history.

Information

Published : 2024-03-15 20:15

Updated : 2024-11-21 09:04


NVD link : CVE-2024-27351

Mitre link : CVE-2024-27351

CVE.ORG link : CVE-2024-27351


JSON object : View

Products Affected

No product.

CWE
CWE-1333

Inefficient Regular Expression Complexity