{"id":"CVE-2023-43665","details":"In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.","aliases":["BIT-django-2023-43665","GHSA-h8gc-pgj2-vjm3","PYSEC-2023-226"],"modified":"2026-04-10T05:02:47.160644Z","published":"2023-11-03T05:15:30.047Z","related":["SUSE-SU-2023:4232-1","SUSE-SU-2023:4426-1","openSUSE-SU-2023:0309-1","openSUSE-SU-2023:0310-1","openSUSE-SU-2023:0389-1","openSUSE-SU-2023:0390-1","openSUSE-SU-2024:13334-1","openSUSE-SU-2024:14208-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/03/04/1"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231221-0001/"},{"type":"ADVISORY","url":"https://www.djangoproject.com/weblog/2023/oct/04/security-releases/"},{"type":"REPORT","url":"https://groups.google.com/forum/#%21forum/django-announce"},{"type":"FIX","url":"https://docs.djangoproject.com/en/4.2/releases/security/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"3591e1c1acbd7c13174275367c3fdf012cb0413b"},{"fixed":"3106e94e52a0a7786d49803c86b3139df113d36d"},{"introduced":"9fee86e44dd83dc968ec443adcde191b3eba1286"},{"fixed":"865974ee933ac0648fabe4458136ce1ceec62192"},{"introduced":"879e5d587b84e6fc961829611999431778eb9f6a"},{"fixed":"c22017bd1dddb5b57d8a179e6378ef0c8d7f5eeb"}],"database_specific":{"versions":[{"introduced":"3.2"},{"fixed":"3.2.22"},{"introduced":"4.1"},{"fixed":"4.1.12"},{"introduced":"4.2"},{"fixed":"4.2.6"}]}}],"versions":["4.2","4.2.1","4.2.2","4.2.3","4.2.4","4.2.5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"39"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-43665.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}