An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Link | Tags |
---|---|
https://docs.djangoproject.com/en/dev/releases/security/ | vendor advisory |
https://groups.google.com/forum/#%21forum/django-announce | permissions required |
https://www.djangoproject.com/weblog/2024/jul/09/security-releases/ | vendor advisory |