// For flags

CVE-2020-15225

Denial of Service vulnerability in django-filter

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

django-filter is a generic system for filtering Django QuerySets based on user selections. In django-filter before version 2.4.0, automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances. In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.

django-filter es un sistema genérico para filtrar Django QuerySets en función de las selecciones del usuario. En django-filter anterior a la versión 2.4.0, las instancias de "NumberFilter" generadas automáticamente, cuyo valor se convirtió más tarde en un entero, estaban sujetas a posibles DoS de la entradas maliciosas usando un formato exponencial con exponentes suficientemente grandes. La versión 2.4.0+ aplica un "MaxValueValidator" con un "limit_value" predeterminado de 1e50 al campo de formulario usado por unas instancias de "NumberFilter". Además, "NumberFilter" implementa el nuevo "get_max_validator()" que debería devolver una instancia de validación configurada para personalizar el límite, o bien "None" para deshabilitar una comprobación adicional. Los usuarios pueden aplicar manualmente un validador equivalente si no pueden actualizar.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-06-25 CVE Reserved
  • 2021-04-29 CVE Published
  • 2023-11-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-681: Incorrect Conversion between Numeric Types
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Django-filter Project
Search vendor "Django-filter Project"
Django-filter
Search vendor "Django-filter Project" for product "Django-filter"
< 2.4.0
Search vendor "Django-filter Project" for product "Django-filter" and version " < 2.4.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected