CVE-2009-3695
Mandriva Linux Security Advisory 2009-276
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
Vulnerabilidad de complejidad algorítmica en la forma library en Django v1.0 anterior v1.0.4 y v1.1 anterior v1.1.1 permite a atacantes remotos causar una denegación de servicio (consumo CPU( a través de (1) EmailField (dirección email) o (2) URLField (URL)que provoca una gran cantidad de backtracking (vuelta a atrás) en una expresión regular.
The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not properly map URL requests to expected static media files, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a crafted URL. Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression. The versions of Django shipping with Mandriva Linux have been updated to the latest patched version that include the fix for this issue. In addition, they provide other bug fixes. Packages for 2008.0 are being provided due to extended support for Corporate products.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-10-13 CVE Reserved
- 2009-10-13 CVE Published
- 2024-08-07 CVE Updated
- 2025-07-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550457 | X_refsource_confirm | |
http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51 | X_refsource_misc | |
http://www.openwall.com/lists/oss-security/2009/10/13/6 | Mailing List |
|
https://exchange.xforce.ibmcloud.com/vulnerabilities/53727 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.djangoproject.com/weblog/2009/oct/09/security | 2017-08-17 | |
http://www.securityfocus.com/bid/36655 | 2017-08-17 | |
http://www.vupen.com/english/advisories/2009/2871 | 2017-08-17 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/36948 | 2017-08-17 | |
http://secunia.com/advisories/36968 | 2017-08-17 | |
http://www.debian.org/security/2009/dsa-1905 | 2017-08-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Djangoproject Search vendor "Djangoproject" | Django Search vendor "Djangoproject" for product "Django" | 1.0 Search vendor "Djangoproject" for product "Django" and version "1.0" | - |
Affected
| ||||||
Djangoproject Search vendor "Djangoproject" | Django Search vendor "Djangoproject" for product "Django" | 1.1 Search vendor "Djangoproject" for product "Django" and version "1.1" | - |
Affected
|