Skip to content

Commit 580ffa7

Browse files
1 parent 11c4716 commit 580ffa7

3 files changed

Lines changed: 169 additions & 39 deletions

File tree

Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4rrr-2h4v-f3j9",
4+
"modified": "2026-02-03T19:31:15Z",
5+
"published": "2026-02-03T15:30:23Z",
6+
"aliases": [
7+
"CVE-2026-1285"
8+
],
9+
"summary": "Django has Inefficient Algorithmic Complexity",
10+
"details": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\n\nDjango would like to thank Seokchan Yoon for reporting this issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "Django"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "6.0a1"
29+
},
30+
{
31+
"fixed": "6.0.2"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "PyPI",
40+
"name": "Django"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "5.2a1"
48+
},
49+
{
50+
"fixed": "5.2.11"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "PyPI",
59+
"name": "Django"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "4.2a1"
67+
},
68+
{
69+
"fixed": "4.2.28"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "ADVISORY",
79+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1285"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/django/django/commit/a33540b3e20b5d759aa8b2e4b9ca0e8edd285344"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://docs.djangoproject.com/en/dev/releases/security"
88+
},
89+
{
90+
"type": "PACKAGE",
91+
"url": "https://github.com/django/django"
92+
},
93+
{
94+
"type": "WEB",
95+
"url": "https://groups.google.com/g/django-announce"
96+
},
97+
{
98+
"type": "WEB",
99+
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases"
100+
}
101+
],
102+
"database_specific": {
103+
"cwe_ids": [
104+
"CWE-407"
105+
],
106+
"severity": "LOW",
107+
"github_reviewed": true,
108+
"github_reviewed_at": "2026-02-03T19:31:15Z",
109+
"nvd_published_at": "2026-02-03T15:16:13Z"
110+
}
111+
}
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-q728-gf8j-w49r",
4+
"modified": "2026-02-03T19:32:01Z",
5+
"published": "2026-02-03T19:32:01Z",
6+
"aliases": [
7+
"CVE-2026-24053"
8+
],
9+
"summary": "Cluade Code has a Path Restriction Bypass via ZSH Clobber which Allows Arbitrary File Writes",
10+
"details": "Due to a Bash command validation flaw in parsing ZSH clobber syntax, it was possible to bypass directory restrictions and write files outside the current working directory without user permission prompts. Exploiting this required the user to use ZSH and the ability to add untrusted content into a Claude Code context window. \n\nUsers on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.\n\nClaude Code thanks https://hackerone.com/alexbernier for reporting this issue!",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@anthropic-ai/claude-code"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.0.74"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/anthropics/claude-code/security/advisories/GHSA-q728-gf8j-w49r"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/anthropics/claude-code"
46+
}
47+
],
48+
"database_specific": {
49+
"cwe_ids": [
50+
"CWE-22",
51+
"CWE-78"
52+
],
53+
"severity": "HIGH",
54+
"github_reviewed": true,
55+
"github_reviewed_at": "2026-02-03T19:32:01Z",
56+
"nvd_published_at": null
57+
}
58+
}

advisories/unreviewed/2026/02/GHSA-4rrr-2h4v-f3j9/GHSA-4rrr-2h4v-f3j9.json

Lines changed: 0 additions & 39 deletions
This file was deleted.

0 commit comments

Comments
 (0)