Vulnerability Description
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Djangoproject | Django | >= 3.2, < 3.2.20 |
| Debian | Debian Linux | 10.0 |
| Fedoraproject | Fedora | 37 |
Related Weaknesses (CWE)
References
- https://docs.djangoproject.com/en/4.2/releases/security/Release Notes
- https://groups.google.com/forum/#%21forum/django-announcePermissions Required
- https://lists.debian.org/debian-lts-announce/2023/07/msg00022.htmlMailing List
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.debian.org/security/2023/dsa-5465Third Party Advisory
- https://www.djangoproject.com/weblog/2023/jul/03/security-releases/PatchVendor Advisory
- https://docs.djangoproject.com/en/4.2/releases/security/Release Notes
- https://groups.google.com/forum/#%21forum/django-announcePermissions Required
- https://lists.debian.org/debian-lts-announce/2023/07/msg00022.htmlMailing List
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/[email protected]
FAQ
What is CVE-2023-36053?
CVE-2023-36053 is a vulnerability with a CVSS score of 7.5 (HIGH). In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large numb...
How severe is CVE-2023-36053?
CVE-2023-36053 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36053?
Check the references section above for vendor advisories and patch information. Affected products include: Djangoproject Django, Debian Debian Linux, Fedoraproject Fedora.