An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Link | Tags |
---|---|
https://docs.djangoproject.com/en/dev/releases/security/ | patch vendor advisory |
https://groups.google.com/forum/#%21forum/django-announce | not applicable |
https://www.djangoproject.com/weblog/2024/aug/06/security-releases/ | vendor advisory |