CVE-2024-28865

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28865
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28865.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28865
Aliases
Published
2024-03-18T22:15:09Z
Modified
2024-05-23T01:28:10.373924Z
Summary
[none]
Details

django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a regular expression loop. Version 0.10.1 fixes this issue. As a workaround, close off access to create and edit articles by anonymous users.

References

Affected packages

Git / github.com/django-wiki/django-wiki

Affected ranges

Type
GIT
Repo
https://github.com/django-wiki/django-wiki
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

alpha/0.*

alpha/0.0.12
alpha/0.0.13
alpha/0.0.14
alpha/0.0.15
alpha/0.0.16
alpha/0.0.17
alpha/0.0.18
alpha/0.0.19
alpha/0.0.20
alpha/0.0.22
alpha/0.0.23
alpha/0.0.24
alpha/0.4a1
alpha/0.4a2
alpha/0.4a3
alpha/0.4a4
alpha/0.4a5

beta/0.*

beta/0.3b1
beta/0.3b2
beta/0.3b3
beta/0.3b4
beta/0.4b1
beta/0.4b2
beta/0.4b3
beta/0.6b1
beta/0.6b2

releases/0.*

releases/0.1
releases/0.1.1
releases/0.1.2
releases/0.10
releases/0.10b1
releases/0.2
releases/0.2.1
releases/0.2.2
releases/0.2.3
releases/0.2.4
releases/0.2.5
releases/0.2b1
releases/0.2b2
releases/0.3
releases/0.3.1
releases/0.4
releases/0.4.1
releases/0.4.2
releases/0.4.3
releases/0.4.4
releases/0.4.5
releases/0.5
releases/0.6
releases/0.7
releases/0.7.1
releases/0.7.10
releases/0.7.2
releases/0.7.3
releases/0.7.4
releases/0.7.5
releases/0.7.6
releases/0.7.7
releases/0.7.8
releases/0.7.9
releases/0.8
releases/0.8.1
releases/0.8.2
releases/0.9