Search for vulnerabilities
Vulnerability details: VCID-ean7-wkmd-aaac
Vulnerability ID VCID-ean7-wkmd-aaac
Aliases CVE-2018-7536
GHSA-r28v-mw67-m5p9
PYSEC-2018-5
Summary An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7536.html
rhas Important https://access.redhat.com/errata/RHSA-2018:2927
rhas Moderate https://access.redhat.com/errata/RHSA-2019:0051
rhas Moderate https://access.redhat.com/errata/RHSA-2019:0082
rhas Moderate https://access.redhat.com/errata/RHSA-2019:0265
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7536.json
epss 0.00623 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00623 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00623 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00623 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.00830 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.01605 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03034 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03212 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03212 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
epss 0.03212 https://api.first.org/data/v1/epss?cve=CVE-2018-7536
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1549777
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7536
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7537
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-r28v-mw67-m5p9
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.3 https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2
generic_textual MODERATE https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2
cvssv3.1 5.3 https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16
generic_textual MODERATE https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16
cvssv3.1 5.3 https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8
generic_textual MODERATE https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8
cvssv3.1 5.3 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-5.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-5.yaml
cvssv3.1 5.3 https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2018-7536
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2018-7536
archlinux Medium https://security.archlinux.org/AVG-649
generic_textual Medium https://ubuntu.com/security/notices/USN-3591-1
cvssv3.1 5.3 https://usn.ubuntu.com/3591-1
generic_textual MODERATE https://usn.ubuntu.com/3591-1
cvssv3.1 5.3 https://web.archive.org/web/20200227131019/http://www.securityfocus.com/bid/103361
generic_textual MODERATE https://web.archive.org/web/20200227131019/http://www.securityfocus.com/bid/103361
cvssv3.1 5.3 https://www.debian.org/security/2018/dsa-4161
generic_textual MODERATE https://www.debian.org/security/2018/dsa-4161
cvssv3.1 5.3 https://www.djangoproject.com/weblog/2018/mar/06/security-releases
generic_textual MODERATE https://www.djangoproject.com/weblog/2018/mar/06/security-releases
generic_textual Medium https://www.djangoproject.com/weblog/2018/mar/06/security-releases/
cvssv3.1 5.3 http://www.securityfocus.com/bid/103361
generic_textual MODERATE http://www.securityfocus.com/bid/103361
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7536.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7536.json
https://api.first.org/data/v1/epss?cve=CVE-2018-7536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7537
https://github.com/django/django
https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2
https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16
https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-5.yaml
https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html
https://ubuntu.com/security/notices/USN-3591-1
https://usn.ubuntu.com/3591-1
https://usn.ubuntu.com/3591-1/
https://web.archive.org/web/20200227131019/http://www.securityfocus.com/bid/103361
https://www.debian.org/security/2018/dsa-4161
https://www.djangoproject.com/weblog/2018/mar/06/security-releases
https://www.djangoproject.com/weblog/2018/mar/06/security-releases/
http://www.securityfocus.com/bid/103361
1549777 https://bugzilla.redhat.com/show_bug.cgi?id=1549777
ASA-201803-5 https://security.archlinux.org/ASA-201803-5
AVG-649 https://security.archlinux.org/AVG-649
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-7536 https://nvd.nist.gov/vuln/detail/CVE-2018-7536
GHSA-r28v-mw67-m5p9 https://github.com/advisories/GHSA-r28v-mw67-m5p9
RHSA-2018:2927 https://access.redhat.com/errata/RHSA-2018:2927
RHSA-2019:0051 https://access.redhat.com/errata/RHSA-2019:0051
RHSA-2019:0082 https://access.redhat.com/errata/RHSA-2019:0082
RHSA-2019:0265 https://access.redhat.com/errata/RHSA-2019:0265
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7536.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-5.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7536
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7536
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://usn.ubuntu.com/3591-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://web.archive.org/web/20200227131019/http://www.securityfocus.com/bid/103361
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://www.debian.org/security/2018/dsa-4161
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://www.djangoproject.com/weblog/2018/mar/06/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at http://www.securityfocus.com/bid/103361
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.78732
EPSS Score 0.00623
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.