Django Denial-of-service in django.utils.text.Truncator
High severity
GitHub Reviewed
Published
Aug 6, 2019
to the GitHub Advisory Database
•
Updated Sep 20, 2024
Package
Affected versions
>= 1.11a1, < 1.11.23
>= 2.1a1, < 2.1.11
>= 2.2a1, < 2.2.4
Patched versions
1.11.23
2.1.11
2.2.4
Description
Published by the National Vulnerability Database
Aug 2, 2019
Reviewed
Aug 6, 2019
Published to the GitHub Advisory Database
Aug 6, 2019
Last updated
Sep 20, 2024
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If
django.utils.text.Truncator
'schars()
andwords()
methods were passed thehtml=True
argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. Thechars()
andwords()
methods are used to implement thetruncatechars_htm
l andtruncatewords_html
template filters, which were thus vulnerable.References