Python/django/4.0


A high-level Python web framework that encourages rapid development and clean, pragmatic design.

https://pypi.org/project/django
BSD-3-Clause AND BSD

6 Security Vulnerabilities

Infinite Loop in Django

Published date: 2022-02-04T00:00:26Z
CVE: CVE-2022-23833
Links:

An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.

Affected versions: ["4.0", "4.0.1", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "2.2", "2.2.1", "2.2.10", "2.2.11", "2.2.12", "2.2.13", "2.2.14", "2.2.15", "2.2.16", "2.2.17", "2.2.18", "2.2.19", "2.2.2", "2.2.20", "2.2.3", "2.2.4", "2.2.5", "2.2.6", "2.2.7", "2.2.8", "2.2.9", "2.2.21", "2.2.22", "2.2.23", "2.2.24", "2.2.25", "2.2.26"]
Secure versions: [2.2.27, 2.2.28, 3.0a1, 3.1.12, 3.1.13, 3.1.14, 3.2.25, 4.1.13, 4.2.17, 4.2.18, 4.2.19, 4.2.20, 4.2.21, 4.2.22, 4.2.23, 4.2a1, 4.2b1, 4.2rc1, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0a1, 5.0b1, 5.0rc1, 5.1.10, 5.1.11, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1a1, 5.1b1, 5.1rc1, 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2a1, 5.2b1, 5.2rc1]
Recommendation: Update to version 5.2.3.

Cross-site Scripting in Django

Published date: 2022-02-04T00:00:33Z
CVE: CVE-2022-22818
Links:

The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.

Affected versions: ["4.0", "4.0.1", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "2.2.12", "2.2.17", "2.2.18", "2.2.9", "2.2", "2.2.1", "2.2.10", "2.2.11", "2.2.13", "2.2.14", "2.2.15", "2.2.16", "2.2.19", "2.2.2", "2.2.20", "2.2.3", "2.2.4", "2.2.5", "2.2.6", "2.2.7", "2.2.8", "2.2.21", "2.2.22", "2.2.23", "2.2.24", "2.2.25", "2.2.26"]
Secure versions: [2.2.27, 2.2.28, 3.0a1, 3.1.12, 3.1.13, 3.1.14, 3.2.25, 4.1.13, 4.2.17, 4.2.18, 4.2.19, 4.2.20, 4.2.21, 4.2.22, 4.2.23, 4.2a1, 4.2b1, 4.2rc1, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0a1, 5.0b1, 5.0rc1, 5.1.10, 5.1.11, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1a1, 5.1b1, 5.1rc1, 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2a1, 5.2b1, 5.2rc1]
Recommendation: Update to version 5.2.3.

Django has regular expression denial of service vulnerability in EmailValidator/URLValidator

Published date: 2023-07-03T15:30:45Z
CVE: CVE-2023-36053
Links:

In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.

Affected versions: ["3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13", "3.2.14", "3.2.15", "3.2.16", "3.2.17", "3.2.18", "3.2.19", "4.0", "4.0.1", "4.0.2", "4.0.3", "4.0.4", "4.1a1", "4.0.5", "4.1b1", "4.0.6", "4.1rc1", "4.0.7", "4.1", "4.1.1", "4.0.8", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.0.9", "4.1.6", "4.0.10", "4.1.7", "4.1.8", "4.1.9", "4.2", "4.2.1", "4.2.2"]
Secure versions: [2.2.27, 2.2.28, 3.0a1, 3.1.12, 3.1.13, 3.1.14, 3.2.25, 4.1.13, 4.2.17, 4.2.18, 4.2.19, 4.2.20, 4.2.21, 4.2.22, 4.2.23, 4.2a1, 4.2b1, 4.2rc1, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0a1, 5.0b1, 5.0rc1, 5.1.10, 5.1.11, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1a1, 5.1b1, 5.1rc1, 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2a1, 5.2b1, 5.2rc1]
Recommendation: Update to version 5.2.3.

Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection

Published date: 2022-07-05T00:00:53Z
CVE: CVE-2022-34265
Links:

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

Affected versions: ["4.0", "4.0.1", "4.0.2", "4.0.3", "4.0.4", "4.0.5", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13"]
Secure versions: [2.2.27, 2.2.28, 3.0a1, 3.1.12, 3.1.13, 3.1.14, 3.2.25, 4.1.13, 4.2.17, 4.2.18, 4.2.19, 4.2.20, 4.2.21, 4.2.22, 4.2.23, 4.2a1, 4.2b1, 4.2rc1, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0a1, 5.0b1, 5.0rc1, 5.1.10, 5.1.11, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1a1, 5.1b1, 5.1rc1, 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2a1, 5.2b1, 5.2rc1]
Recommendation: Update to version 5.2.3.

Django contains Uncontrolled Resource Consumption via cached header

Published date: 2023-02-01T21:30:23Z
CVE: CVE-2023-23969
Links:

In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.

Affected versions: ["4.0b1", "4.0rc1", "4.1a1", "4.1b1", "4.1rc1", "4.1", "4.1.1", "4.1.2", "4.1.3", "4.1.4", "4.1.5", "4.0a1", "4.0", "4.0.1", "4.0.2", "4.0.3", "4.0.4", "4.0.5", "4.0.6", "4.0.7", "4.0.8", "3.1rc1", "3.2", "3.2rc1", "3.0b1", "3.0rc1", "3.1b1", "3.2a1", "3.2b1", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13", "3.2.14", "3.2.15", "3.2.16"]
Secure versions: [2.2.27, 2.2.28, 3.0a1, 3.1.12, 3.1.13, 3.1.14, 3.2.25, 4.1.13, 4.2.17, 4.2.18, 4.2.19, 4.2.20, 4.2.21, 4.2.22, 4.2.23, 4.2a1, 4.2b1, 4.2rc1, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0a1, 5.0b1, 5.0rc1, 5.1.10, 5.1.11, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1a1, 5.1b1, 5.1rc1, 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2a1, 5.2b1, 5.2rc1]
Recommendation: Update to version 5.2.3.

Django denial-of-service vulnerability in internationalized URLs

Published date: 2022-10-16T12:00:23Z
CVE: CVE-2022-41323
Links:

In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.

Affected versions: ["4.1", "4.1.1", "4.0", "4.0.1", "4.0.2", "4.0.3", "4.0.4", "4.0.5", "4.0.6", "4.0.7", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.2.4", "3.2.5", "3.2.6", "3.2.7", "3.2.8", "3.2.9", "3.2.10", "3.2.11", "3.2.12", "3.2.13", "3.2.14", "3.2.15"]
Secure versions: [2.2.27, 2.2.28, 3.0a1, 3.1.12, 3.1.13, 3.1.14, 3.2.25, 4.1.13, 4.2.17, 4.2.18, 4.2.19, 4.2.20, 4.2.21, 4.2.22, 4.2.23, 4.2a1, 4.2b1, 4.2rc1, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0a1, 5.0b1, 5.0rc1, 5.1.10, 5.1.11, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1a1, 5.1b1, 5.1rc1, 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2a1, 5.2b1, 5.2rc1]
Recommendation: Update to version 5.2.3.

400 Other Versions

Version License Security Released
1.8.14 BSD 12 2016-07-18 - 18:38 almost 9 years
1.8.13 BSD 13 2016-05-02 - 22:49 about 9 years
1.8.12 BSD 13 2016-04-01 - 17:54 about 9 years
1.8.11 BSD 13 2016-03-05 - 18:36 over 9 years
1.8.10 BSD 13 2016-03-01 - 17:10 over 9 years
1.8.9 BSD 15 2016-02-01 - 17:24 over 9 years
1.8.8 BSD 15 2016-01-02 - 14:28 over 9 years
1.8.7 BSD 15 2015-11-24 - 17:28 over 9 years
1.8.6 BSD 15 2015-11-04 - 17:03 over 9 years
1.8.5 BSD 15 2015-10-04 - 00:06 over 9 years
1.8.4 BSD 15 2015-08-18 - 17:06 almost 10 years
1.8.3 BSD 16 2015-07-08 - 19:43 almost 10 years
1.8.2 BSD 17 2015-05-20 - 18:02 about 10 years
1.8.1 BSD 17 2015-05-01 - 20:36 about 10 years
1.8 BSD 17 2015-04-01 - 20:12 about 10 years
1.7.11 BSD 9 2015-11-24 - 17:19 over 9 years
1.7.10 BSD 10 2015-08-18 - 17:15 almost 10 years
1.7.9 BSD 11 2015-07-08 - 21:33 almost 10 years
1.7.8 BSD 11 2015-05-01 - 20:42 about 10 years
1.7.7 BSD 11 2015-03-18 - 23:49 over 10 years
1.7.6 BSD 11 2015-03-09 - 15:30 over 10 years
1.7.5 BSD 12 2015-02-25 - 13:58 over 10 years
1.7.4 BSD 12 2015-01-27 - 17:22 over 10 years
1.7.3 BSD 12 2015-01-13 - 18:39 over 10 years
1.7.2 BSD 12 2015-01-03 - 01:37 over 10 years
1.7.1 BSD 12 2014-10-22 - 16:56 over 10 years
1.7 BSD 12 2014-09-02 - 21:09 almost 11 years
1.6.11 BSD 10 2015-03-18 - 23:57 over 10 years
1.6.10 BSD 10 2015-01-13 - 18:48 over 10 years
1.6.9 BSD 10 2015-01-03 - 01:52 over 10 years
1.6.8 BSD 10 2014-10-22 - 16:50 over 10 years
1.6.7 BSD 10 2014-09-02 - 20:55 almost 11 years
1.6.6 BSD 10 2014-08-20 - 20:17 almost 11 years
1.6.5 BSD 11 2014-05-14 - 18:33 about 11 years
1.6.4 BSD 13 2014-04-28 - 20:40 about 11 years
1.6.3 BSD 13 2014-04-21 - 23:12 about 11 years
1.6.2 BSD 13 2014-02-06 - 21:51 over 11 years
1.6.1 BSD 13 2013-12-12 - 20:04 over 11 years
1.6 BSD 13 2013-11-06 - 15:01 over 11 years
1.5.12 BSD 10 2015-01-03 - 02:09 over 10 years
1.5.11 BSD 10 2014-10-22 - 16:45 over 10 years
1.5.10 BSD 10 2014-09-02 - 20:51 almost 11 years
1.5.9 BSD 10 2014-08-20 - 20:10 almost 11 years
1.5.8 BSD 10 2014-05-14 - 18:35 about 11 years
1.5.7 BSD 12 2014-04-28 - 20:35 about 11 years
1.5.6 BSD 12 2014-04-21 - 22:53 about 11 years
1.5.5 BSD 12 2013-10-25 - 04:32 over 11 years
1.5.4 BSD 12 2013-09-15 - 06:30 almost 12 years
1.5.3 BSD 13 2013-09-11 - 01:26 almost 12 years
1.5.2 BSD 14 2013-08-13 - 16:54 almost 12 years