{"id":"PYSEC-2023-12","details":"In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.","aliases":["BIT-django-2023-23969","CVE-2023-23969","GHSA-q2jf-h9jm-m7p4"],"modified":"2023-12-06T01:02:51.759822Z","published":"2023-02-01T19:15:00Z","references":[{"type":"WEB","url":"https://docs.djangoproject.com/en/4.1/releases/security/"},{"type":"ARTICLE","url":"https://www.djangoproject.com/weblog/2023/feb/01/security-releases/"},{"type":"WEB","url":"https://groups.google.com/forum/#!forum/django-announce"}],"affected":[{"package":{"name":"django","ecosystem":"PyPI","purl":"pkg:pypi/django"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.2"},{"fixed":"3.2.17"},{"introduced":"4.0"},{"fixed":"4.0.9"},{"introduced":"4.1"},{"fixed":"4.1.6"}]}],"versions":["3.2","3.2.1","3.2.10","3.2.11","3.2.12","3.2.13","3.2.14","3.2.15","3.2.16","3.2.2","3.2.3","3.2.4","3.2.5","3.2.6","3.2.7","3.2.8","3.2.9","4.0","4.0.1","4.0.2","4.0.3","4.0.4","4.0.5","4.0.6","4.0.7","4.0.8","4.1","4.1.1","4.1.2","4.1.3","4.1.4","4.1.5"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/django/PYSEC-2023-12.yaml"}}],"schema_version":"1.7.3"}