BIT-django-2024-45230

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/django/BIT-django-2024-45230.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-django-2024-45230
Aliases
Published
2024-10-19T07:08:51.488Z
Modified
2024-10-19T07:57:12.374743Z
Summary
[none]
Details

An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.

Database specific
{
    "cpes": [
        "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / django

Package

Name
django
Purl
pkg:bitnami/django

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
4.2.0
Fixed
4.2.16
Introduced
5.0.0
Fixed
5.0.9
Type
SEMVER
Events
Introduced
5.1.0
Last affected
5.1.0