GHSA-296w-6qhq-gf92

Suggest an improvement
Source
https://github.com/advisories/GHSA-296w-6qhq-gf92
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-296w-6qhq-gf92/GHSA-296w-6qhq-gf92.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-296w-6qhq-gf92
Aliases
Published
2022-05-14T02:05:08Z
Modified
2024-09-18T16:08:02.204181Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Django denial of service via file upload naming
Details

The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.

References

Affected packages

PyPI / django

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.14

Affected versions

1.*

1.0.1
1.0.2
1.0.3
1.0.4
1.1
1.1.1
1.1.2
1.1.3
1.1.4
1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.3
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.4
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.4.9
1.4.10
1.4.11
1.4.12
1.4.13

Ecosystem specific

{
    "affected_functions": [
        "django.core.files.storage.Storage.get_available_name"
    ]
}

PyPI / django

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.5
Fixed
1.5.9

Affected versions

1.*

1.5
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
1.5.8

PyPI / django

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.6
Fixed
1.6.6

Affected versions

1.*

1.6
1.6.1
1.6.2
1.6.3
1.6.4
1.6.5

Ecosystem specific

{
    "affected_functions": [
        "django.core.files.storage.Storage.get_available_name"
    ]
}