CVE-2013-0306
Published May 2, 2013
Last updated 12 years ago
Overview
- Description
- The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F5428AE-6B63-4D27-BCC4-F228264A6F0E" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06F122AC-B9BF-4E27-A7C0-F3E7B5E8A907" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33D378F8-CFDC-4882-A838-406ABA7AD8CC" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "132795AE-92DD-42CB-A59E-5F7136F93B46" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B5BE262-260E-4250-8F68-7392FD68970E" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F18B54E2-447B-4B38-9E88-6833F67EB24C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A79FF7F-8F92-4FEB-96CC-6B15D0CE920D" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1E1C4B1-2A0A-459C-8348-AA7DA5C5B781" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F979543B-913B-46E9-8A40-BE2707D297F0" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13EF02D4-406C-4146-9B8F-FAC906E7B6E5" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC462CE5-1BE0-41E0-A28D-291350F021AA" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A26B113-8D22-46E5-92C3-12134A68A21E" }, { "criteria": "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D99FB28-08F3-45B4-8C04-90074FBC2457" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE" } ], "operator": "OR" } ] } ]