{"id":"CVE-2021-45115","details":"An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.","aliases":["BIT-django-2021-45115","GHSA-53qw-q765-4fww","PYSEC-2022-1"],"modified":"2026-04-02T07:36:20.293425Z","published":"2022-01-05T00:15:07.907Z","related":["MGASA-2022-0011","SUSE-SU-2022:0102-1","SUSE-SU-2022:0103-1","openSUSE-SU-2023:0005-1","openSUSE-SU-2024:11725-1","openSUSE-SU-2024:14208-1","openSUSE-SU-2025:14662-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/"},{"type":"WEB","url":"https://groups.google.com/forum/#%21forum/django-announce"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220121-0005/"},{"type":"FIX","url":"https://www.djangoproject.com/weblog/2022/jan/04/security-releases/"},{"type":"FIX","url":"https://docs.djangoproject.com/en/4.0/releases/security/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"2a62cdcfec85938f40abb2e9e6a9ff497e02afe8"},{"fixed":"44e7cca62382f2535ed0f5d2842b433f0bd23a57"},{"introduced":"3591e1c1acbd7c13174275367c3fdf012cb0413b"},{"fixed":"6e499a28ac6ec10c2f0f77b92cab49fb8f8df419"},{"introduced":"ef62a3a68c9d558486145a42c0d71ea9a76add9e"},{"fixed":"27a64da8213f27787ae1c48041a70f197cdcfd6f"}],"database_specific":{"versions":[{"introduced":"2.2"},{"fixed":"2.2.26"},{"introduced":"3.2"},{"fixed":"3.2.11"},{"introduced":"4.0"},{"fixed":"4.0.1"}]}}],"versions":["stable/2.2.x","stable/3.2.x","stable/4.0.x"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"35"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-45115.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}