5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
0.008 Low
EPSS
Percentile
82.1%
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11,
and 1.8 before 1.8.19. The django.utils.html.urlize() function was
extremely slow to evaluate certain inputs due to catastrophic backtracking
vulnerabilities in two regular expressions (only one regular expression for
Django 1.8.x). The urlize() function is used to implement the urlize and
urlizetrunc template filters, which were thus vulnerable.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | python-django | < 1:1.11.4-1ubuntu1.2 | UNKNOWN |
ubuntu | 14.04 | noarch | python-django | < 1.6.11-0ubuntu1.2 | UNKNOWN |
ubuntu | 16.04 | noarch | python-django | < 1.8.7-1ubuntu5.6 | UNKNOWN |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
0.008 Low
EPSS
Percentile
82.1%