[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-23969Date: (C)2023-02-03   (M)2024-06-25


In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score :
Exploit Score: 3.9Exploit Score:
Impact Score: 3.6Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: NONEAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: NONEAvailability:
Integrity: NONE 
Availability: HIGH 
  
Reference:
FEDORA-2023-8fed428c5e
FEDORA-2023-a53ab7c969
https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html
https://docs.djangoproject.com/en/4.1/releases/security/
https://groups.google.com/forum/#%21forum/django-announce
https://security.netapp.com/advisory/ntap-20230302-0007/
https://www.djangoproject.com/weblog/2023/feb/01/security-releases/

CPE    1
cpe:/a:djangoproject:django
CWE    1
CWE-770
OVAL    9
oval:org.secpod.oval:def:89443
oval:org.secpod.oval:def:125492
oval:org.secpod.oval:def:125370
oval:org.secpod.oval:def:3300200
...

© SecPod Technologies