vulnerability
Oracle Solaris 11: CVE-2018-7537: Vulnerability in Django Python web framework
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 2018-03-09 | 2018-12-17 | 2022-02-17 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2018-03-09
Added
2018-12-17
Modified
2022-02-17
Description
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
Solution(s)
oracle-solaris-11-4-upgrade-library-python-django-1-11-16-11-4-4-0-1-1-0oracle-solaris-11-4-upgrade-library-python-django-27-1-11-16-11-4-4-0-1-1-0

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.