Vulnerability identifier: #VU44585
Vulnerability risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Django
Web applications /
CMS
Vendor: Django Software Foundation
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Django: 0.91 - 0.96, 1.0 - 1.3
External links
http://openwall.com/lists/oss-security/2011/09/11/1
http://openwall.com/lists/oss-security/2011/09/13/2
http://openwall.com/lists/oss-security/2011/09/15/5
http://secunia.com/advisories/46614
http://www.debian.org/security/2011/dsa-2332
http://bugzilla.redhat.com/show_bug.cgi?id=737366
http://hermes.opensuse.org/messages/14700881
http://www.djangoproject.com/weblog/2011/sep/09/
http://www.djangoproject.com/weblog/2011/sep/10/127/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.