CVE-2018-7536
Publication date 6 March 2018
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| python-django | ||
| 16.04 LTS xenial |
Fixed 1.8.7-1ubuntu5.6
|
|
| 14.04 LTS trusty |
Fixed 1.6.11-0ubuntu1.2
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-3591-1
- Django vulnerabilities
- 6 March 2018