CVE-2024-41991

Aug. 7, 2024, 8:48 p.m.

Analyzed
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

Django

  • 4.2 before 4.2.15
  • 5.0 before 5.0.8

django

  • *

Source

cve@mitre.org

Tags

CVE-2024-41991 details

Published : Aug. 7, 2024, 3:15 p.m.
Last Modified : Aug. 7, 2024, 8:48 p.m.

Description

An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.

CVSS Score

1 2 3 4 5 6 7.5 8 9 10

Weakness

Weakness Name Description
CWE-1284 Improper Validation of Specified Quantity in Input The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
CWE-130 Improper Handling of Length Parameter Inconsistency The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

Base Score

7.5

Exploitability Score

3.9

Impact Score

3.6

Base Severity

HIGH

CPEs

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a djangoproject django / / / / / / / /
a djangoproject django / / / / / / / /
This website uses the NVD API, but is not approved or certified by it.