SB2018031233 - Resource exhaustion in py-django (Alpine package)
Published: March 12, 2018
Security Bulletin ID
SB2018031233
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Resource exhaustion (CVE-ID: CVE-2018-7537)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the django.utils.html.urlize() function due to it was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions. The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable. A remote attacker can cause the service to crash.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=be7e22246de0916a68b640d89fc11fa95ea548b5
- https://git.alpinelinux.org/aports/commit/?id=f8e1ef0d88411710f944cadedc434d54b1406b18
- https://git.alpinelinux.org/aports/commit/?id=1ed873bbcaa6cdeb56897c0287a0725e77f20ec9
- https://git.alpinelinux.org/aports/commit/?id=aac947d54afaf9dcc0db074c91149f8063f9d3ab
- https://git.alpinelinux.org/aports/commit/?id=c6946cd412005ff67f9ffa26bae05148414d006c
- https://git.alpinelinux.org/aports/commit/?id=7f0d54bad668ff5111969a5de34d29472bb4a4ec