|
Django
|
5.1
|
<4.2.17 ,
>=5.0a1,<5.0.10 ,
>=5.1a1,<5.1.4
|
show Affected versions of Django are vulnerable to a potential denial-of-service (DoS) attack in the `django.utils.html.strip_tags()` method. The vulnerability occurs when the `strip_tags()` method or the `striptags` template filter processes inputs containing large sequences of nested, incomplete HTML entities.
|
|
Django
|
5.1
|
<4.2.16 ,
>=5.0a1,<5.0.9 ,
>=5.1a1,<5.1.1
|
show A security vulnerability has been discovered in certain versions of Django, affecting the password reset functionality. The PasswordResetForm class in django.contrib.auth.forms inadvertently allowed attackers to enumerate user email addresses by exploiting unhandled exceptions during the email sending process. This could be done by issuing password reset requests and observing the responses. Django has implemented a fix where these exceptions are now caught and logged using the django.contrib.auth logger, preventing potential information leakage through error responses.
|
|
Django
|
5.1
|
>=4.2a1,<4.2.25 ,
>=5.1a1,<5.1.13 ,
>=5.2a1,<5.2.7
|
show Affected versions of the Django package are vulnerable to SQL Injection due to insufficient neutralization of user-controlled column alias names provided via dictionary expansion. The QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() methods accept **kwargs whose keys are used as column aliases, and on MySQL and MariaDB, those identifiers are not safely quoted, permitting crafted input to be incorporated into the generated SQL.
|
|
Django
|
5.1
|
>=5.1a1,<5.1.5 ,
>=5.0a1,<5.0.11 ,
>=4.2a1,<4.2.18
|
show Affected versions of Django are vulnerable to a potential denial-of-service attack due to improper IPv6 validation. The lack of upper limit enforcement for input strings in clean_ipv6_address, is_valid_ipv6_address, and the django.forms.GenericIPAddressField form field allowed attackers to exploit overly long inputs, causing resource exhaustion. The vulnerability is addressed by defining a max_length of 39 characters for affected form fields. The django.db.models.GenericIPAddressField model field was not impacted. Users should upgrade promptly.
|
|
Django
|
5.1
|
<4.2.26 ,
>=5.1a1,<5.1.14 ,
>=5.2a1,<5.2.8
|
show CVE-2025-64458: Affected versions of the Django package are vulnerable to Denial of Service (DoS) due to slow Unicode NFKC normalization on Windows being applied to untrusted inputs. The django.contrib.auth.views.LoginView and django.contrib.auth.views.LogoutView, and django.views.i18n.set_language normalize user-controlled strings using Python’s NFKC algorithm, which is unusually slow on Windows for huge Unicode sequences and can be triggered to consume excessive CPU.
|
|
Django
|
5.1
|
<4.2.26 ,
>=5.1a1,<5.1.14 ,
>=5.2a1,<5.2.8
|
show CVE-2025-64459: Affected versions of the Django package are vulnerable to SQL Injection due to improper input validation, allowing the internal _connector keyword argument to be accepted from untrusted dictionaries via expansion. The .filter(), .exclude(), and .get() methods on QuerySet, as well as the Q class, resolve **kwargs and will treat a supplied _connector value as the logical connector without constraining it to the expected set (AND/OR), permitting attacker-controlled tokens to influence SQL predicate construction.
|
|
Django
|
5.1
|
<4.2.16 ,
>=5.0a1,<5.0.9 ,
>=5.1a1,<5.1.1
|
show A potential denial-of-service vulnerability has been identified in Django's urlize() and urlizetrunc() functions in django.utils.html. This vulnerability can be triggered by inputting huge strings containing a specific sequence of characters.
|
|
Django
|
5.1
|
>=5.2a1,<5.2.2 ,
>=5.0a1,<5.1.10 ,
<4.2.22
|
show An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.
|
|
Django
|
5.1
|
<4.2.21 ,
>=5.2a1,<5.2.1 ,
>=5.1.0a1,<5.1.9
|
show An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags().
|
|
Django
|
5.1
|
<4.2.17 ,
>=5.0a1,<5.0.10 ,
>=5.1a1,<5.1.4
|
show Django affected versions are vulnerable to a potential SQL injection in the HasKey(lhs, rhs) lookup on Oracle databases. The vulnerability arises when untrusted data is directly used as the lhs value in the django.db.models.fields.json.HasKey lookup. However, applications using the jsonfield.has_key lookup with the __ syntax remain unaffected by this issue.
|
|
Django
|
5.1
|
>=5.0a1,<5.0.14 ,
>=5.1a1,<5.1.8
|
show An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.views.LoginView, django.contrib.auth.views.LogoutView, and django.views.i18n.set_language are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.
|
|
Django
|
5.1
|
<4.2.24 ,
>=5.0a1,<5.1.12 ,
>=5.2a1,<5.2.6
|
show Affected versions of the Django package are vulnerable to SQL Injection due to insufficient input sanitization in FilteredRelation column aliases. The FilteredRelation class fails to properly validate or escape column alias names when they are provided through dictionary expansion as keyword arguments to QuerySet.annotate() or QuerySet.alias() methods, allowing malicious SQL code to be injected directly into the generated database queries.
|
|
Django
|
5.1
|
>=4.2a1,<4.2.25 ,
>=5.1a1,<5.1.13 ,
>=5.2a1,<5.2.7
|
show Affected versions of the Django package are vulnerable to Path Traversal due to improper validation of archive member paths during extraction. The django.utils.archive.extract() function—used by the startapp --template and startproject --template commands—checked path prefixes instead of using canonicalised paths, allowing archive entries whose names share a prefix with the destination to resolve outside the intended directory.
|
|
Django
|
5.1
|
>=4.2a1,< 4.2.20 ,
>=5.0a1,< 5.0.13 ,
>=5.1a1,< 5.1.7
|
show Affected versions of Django are vulnerable to a potential denial-of-service in django.utils.text.wrap(). The django.utils.text.wrap() and wordwrap template filter were subject to a potential denial-of-service attack when used with very long strings.
|