logo

CVE-2024-45230 django

Package

Manager: pip
Name: django
Vulnerable Version: >=5.1 <5.1.1 || >=5.0 <5.0.9 || >=4.2 <4.2.16

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00326 pctl0.54885

Details

Django vulnerable to denial-of-service attack via the urlize() and urlizetrunc() template filters An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.

Metadata

Created: 2024-10-08T18:33:13Z
Modified: 2024-10-30T19:03:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-5hgc-2vfp-mqvc/GHSA-5hgc-2vfp-mqvc.json
CWE IDs: ["CWE-120", "CWE-400"]
Alternative ID: GHSA-5hgc-2vfp-mqvc
Finding: F002
Auto approve: 1