{"id":"USN-4084-1","summary":"python-django vulnerabilities","details":"It was discovered that Django incorrectly handled the Truncator function. A\nremote attacker could possibly use this issue to cause Django to consume\nresources, leading to a denial of service. (CVE-2019-14232)\n\nIt was discovered that Django incorrectly handled the strip_tags function.\nA remote attacker could possibly use this issue to cause Django to consume\nresources, leading to a denial of service. (CVE-2019-14233)\n\nIt was discovered that Django incorrectly handled certain lookups in the\nPostgreSQL support. A remote attacker could possibly use this issue to\nperform SQL injection attacks. (CVE-2019-14234)\n\nIt was discovered that Django incorrectly handled certain invalid UTF-8\noctet sequences. A remote attacker could possibly use this issue to cause\nDjango to consume resources, leading to a denial of service.\n(CVE-2019-14235)\n","modified":"2026-02-10T04:41:35Z","published":"2019-08-01T11:59:17Z","related":["UBUNTU-CVE-2019-14232","UBUNTU-CVE-2019-14233","UBUNTU-CVE-2019-14234","UBUNTU-CVE-2019-14235"],"upstream":["CVE-2019-14232","CVE-2019-14233","CVE-2019-14234","CVE-2019-14235","UBUNTU-CVE-2019-14232","UBUNTU-CVE-2019-14233","UBUNTU-CVE-2019-14234","UBUNTU-CVE-2019-14235"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4084-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14232"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14233"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14234"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14235"}],"affected":[{"package":{"name":"python-django","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/python-django@1.8.7-1ubuntu5.10?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.7-1ubuntu5.10"}]}],"versions":["1.7.9-1ubuntu5","1.8.5-2ubuntu1","1.8.7-1ubuntu1","1.8.7-1ubuntu2","1.8.7-1ubuntu3","1.8.7-1ubuntu4","1.8.7-1ubuntu5","1.8.7-1ubuntu5.1","1.8.7-1ubuntu5.2","1.8.7-1ubuntu5.4","1.8.7-1ubuntu5.5","1.8.7-1ubuntu5.6","1.8.7-1ubuntu5.7","1.8.7-1ubuntu5.8","1.8.7-1ubuntu5.9"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.8.7-1ubuntu5.10","binary_name":"python-django"},{"binary_version":"1.8.7-1ubuntu5.10","binary_name":"python-django-common"},{"binary_version":"1.8.7-1ubuntu5.10","binary_name":"python3-django"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4084-1.json","cves_map":{"cves":[{"id":"CVE-2019-14232","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14233","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14234","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14235","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"python-django","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/python-django@1:1.11.11-1ubuntu1.5?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.11.11-1ubuntu1.5"}]}],"versions":["1:1.11.4-1ubuntu1","1:1.11.6-1ubuntu1","1:1.11.9-1ubuntu1","1:1.11.11-1ubuntu1","1:1.11.11-1ubuntu1.1","1:1.11.11-1ubuntu1.2","1:1.11.11-1ubuntu1.3","1:1.11.11-1ubuntu1.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:1.11.11-1ubuntu1.5","binary_name":"python-django"},{"binary_version":"1:1.11.11-1ubuntu1.5","binary_name":"python-django-common"},{"binary_version":"1:1.11.11-1ubuntu1.5","binary_name":"python3-django"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4084-1.json","cves_map":{"cves":[{"id":"CVE-2019-14232","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14233","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14234","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2019-14235","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}