CVE-2019-14235
Description
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Django's uri_to_iri() function can cause excessive memory consumption via recursive re-percent-encoding of malformed UTF-8 inputs.
Vulnerability
Details
CVE-2019-14235 is a denial-of-service (DoS) vulnerability in Django's django.utils.encoding.uri_to_iri function. When processing certain crafted inputs containing invalid UTF-8 octet sequences, the function enters deep recursion during re-percent-encoding, leading to significant memory consumption and potentially causing the application to crash or become unresponsive [1][2].
Exploitation
An attacker can trigger this vulnerability by sending specially crafted HTTP requests with malformed URI components that are processed by uri_to_iri(). No authentication or special privileges are required; the attack can be carried out remotely if the application reflects or processes user-supplied URIs [3]. The issue affects Django versions prior to 1.11.23, 2.1.11, and 2.2.4 [4].
Impact
The primary impact is a denial of service, where the application may exhaust available memory, leading to degraded performance or a complete crash. This can disrupt service availability for legitimate users. There is no evidence of code execution or data leakage resulting from this vulnerability [3][4].
Mitigation
The Django team released security updates on August 1, 2019, addressing this issue in Django 1.11.23, 2.1.11, and 2.2.4. The fix avoids recursion when re-percent-encoding invalid UTF-8 octet sequences [4]. Users are strongly advised to upgrade to the latest patched versions. No workarounds have been officially provided; upgrading is the recommended course of action.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
DjangoPyPI | >= 1.11a1, < 1.11.23 | 1.11.23 |
DjangoPyPI | >= 2.1a1, < 2.1.11 | 2.1.11 |
DjangoPyPI | >= 2.2a1, < 2.2.4 | 2.2.4 |
Affected products
10- Django/Djangodescription
- ghsa-coords9 versionspkg:pypi/djangopkg:rpm/opensuse/python-Django&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/python-Django1&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/python-Django1&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/python-Django&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/python-Django&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/python-Django&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/python-Django&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/python-Django&distro=SUSE%20Package%20Hub%2015%20SP1
>= 1.11a1, < 1.11.23+ 8 more
- (no CPE)range: >= 1.11a1, < 1.11.23
- (no CPE)range: < 2.2.4-lp151.2.3.1
- (no CPE)range: < 1.11.23-3.9.1
- (no CPE)range: < 1.11.23-3.9.1
- (no CPE)range: < 1.11.23-3.12.1
- (no CPE)range: < 1.8.19-3.15.1
- (no CPE)range: < 1.11.23-3.12.1
- (no CPE)range: < 1.11.23-3.12.1
- (no CPE)range: < 2.2.4-bp151.3.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlghsavendor-advisoryx_refsource_SUSEWEB
- lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.htmlghsavendor-advisoryx_refsource_SUSEWEB
- github.com/advisories/GHSA-v9qg-3j8p-r63vghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2019-14235ghsaADVISORY
- security.gentoo.org/glsa/202004-17ghsavendor-advisoryx_refsource_GENTOOWEB
- www.debian.org/security/2019/dsa-4498ghsavendor-advisoryx_refsource_DEBIANWEB
- docs.djangoproject.com/en/dev/releases/securityghsaWEB
- docs.djangoproject.com/en/dev/releases/security/mitrex_refsource_MISC
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2019-14.yamlghsaWEB
- groups.google.com/forum/ghsaWEB
- groups.google.com/forum/mitrex_refsource_MISC
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTKghsaWEB
- seclists.org/bugtraq/2019/Aug/15ghsamailing-listx_refsource_BUGTRAQWEB
- security.netapp.com/advisory/ntap-20190828-0002ghsaWEB
- security.netapp.com/advisory/ntap-20190828-0002/mitrex_refsource_CONFIRM
- www.djangoproject.com/weblog/2019/aug/01/security-releasesghsaWEB
- www.djangoproject.com/weblog/2019/aug/01/security-releases/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.