{"id":"PYSEC-2024-47","details":"In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.","aliases":["BIT-django-2024-27351","CVE-2024-27351","GHSA-vm8q-m57g-pff3"],"modified":"2024-07-02T08:12:21.263863Z","published":"2024-03-15T20:15:00Z","references":[{"type":"WEB","url":"https://groups.google.com/forum/#%21forum/django-announce"},{"type":"WEB","url":"https://docs.djangoproject.com/en/5.0/releases/security/"},{"type":"ARTICLE","url":"https://www.djangoproject.com/weblog/2024/mar/04/security-releases/"}],"affected":[{"package":{"name":"django","ecosystem":"PyPI","purl":"pkg:pypi/django"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.2"},{"fixed":"3.2.25"},{"introduced":"4.2"},{"fixed":"4.2.11"},{"introduced":"5.0"},{"fixed":"5.0.3"}]}],"versions":["3.2","3.2.1","3.2.10","3.2.11","3.2.12","3.2.13","3.2.14","3.2.15","3.2.16","3.2.17","3.2.18","3.2.19","3.2.2","3.2.20","3.2.21","3.2.22","3.2.23","3.2.24","3.2.3","3.2.4","3.2.5","3.2.6","3.2.7","3.2.8","3.2.9","4.2","4.2.1","4.2.10","4.2.2","4.2.3","4.2.4","4.2.5","4.2.6","4.2.7","4.2.8","4.2.9","5.0","5.0.1","5.0.2"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/django/PYSEC-2024-47.yaml"}}],"schema_version":"1.7.3"}