CVE-2020-15225

NameCVE-2020-15225
Descriptiondjango-filter is a generic system for filtering Django QuerySets based on user selections. In django-filter before version 2.4.0, automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances. In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
django-filter (PTS)buster1.1.0-1vulnerable
bullseye2.4.0-1fixed
bookworm23.1-1fixed
sid, trixie24.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
django-filtersource(unstable)2.4.0-1

Notes

[buster] - django-filter <no-dsa> (Minor issue)
[stretch] - django-filter <no-dsa> (Minor issue)
https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973
https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b

Search for package or bug name: Reporting problems