Vulnerability Name: | CVE-2022-23833 (CCN-218550) | ||||||||||||
Assigned: | 2022-02-01 | ||||||||||||
Published: | 2022-02-01 | ||||||||||||
Updated: | 2022-11-07 | ||||||||||||
Summary: | An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-835 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-23833 Source: MISC Type: Patch, Third Party Advisory https://docs.djangoproject.com/en/4.0/releases/security/ Source: XF Type: UNKNOWN django-cve202223833-dos(218550) Source: MISC Type: Mailing List, Third Party Advisory https://groups.google.com/forum/#!forum/django-announce Source: FEDORA Type: Mailing List, Vendor Advisory FEDORA-2022-e7fd530688 Source: CCN Type: oss-sec Mailing List, Tue, 1 Feb 2022 09:05:56 +0100 Django: CVE-2022-23833: Denial-of-service possibility in file uploads Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220221-0003/ Source: DEBIAN Type: Third Party Advisory DSA-5254 Source: CCN Type: Django Web site Django security releases issued: 4.0.2, 3.2.12, and 2.2.27 Source: CONFIRM Type: Patch, Third Party Advisory https://www.djangoproject.com/weblog/2022/feb/01/security-releases/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |