-
Notifications
You must be signed in to change notification settings - Fork 3
Description
-
Introduced through
[email protected], [email protected] and others
-
Fixed in [email protected]
Detailed paths and remediation
-
Introduced through: [email protected] › [email protected]
Fix: Upgrade django to version 4.2.29 or 5.2.12 or 6.0.3
-
Introduced through: [email protected] › [email protected] › [email protected]
Fix: Pin django to version 4.2.29 or 5.2.12 or 6.0.3
-
Introduced through: [email protected] › [email protected] › [email protected]
Fix: Pin django to version 4.2.29 or 5.2.12 or 6.0.3
…and 6 more
Security information
Factors contributing to the scoring:
- Snyk: CVSS v4.0 6.3 - Medium Severity | CVSS v3.1 3.7 - Low Severity
- NVD: Not available. NVD has not yet published its analysis.
Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the URLField.to_python() function when processing URLs containing certain Unicode characters on Windows systems. An attacker can cause excessive resource consumption and application unresponsiveness by submitting large URL inputs crafted with these characters.
QA Notes
null
DEV Notes
null
Design
null
See full ticket and images here: FECFILE-2938