CVE-2019-14235

Name
CVE-2019-14235
Description
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.djangoproject.com/weblog/2019/aug/01/security-releases/
Patch https://docs.djangoproject.com/en/dev/releases/security/
Third Party Advisory https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html
BUGTRAQ https://seclists.org/bugtraq/2019/Aug/15
DEBIAN https://www.debian.org/security/2019/dsa-4498
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/
CONFIRM https://security.netapp.com/advisory/ntap-20190828-0002/
GENTOO https://security.gentoo.org/glsa/202004-17

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* django >= 2.2 < 2.2.4
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* django >= 1.11 < 1.11.23
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* django >= 2.1 < 2.1.11

Vulnerable and fixed packages

Source package Branch Version Maintainer Status