First published: Tue Jan 30 2024(Updated: )
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-django | <=1:1.11.29-1~deb10u1<=1:1.11.29-1+deb10u11<=2:2.2.28-1~deb11u2<=3:3.2.19-1+deb12u1 | 3:4.2.11-1 |
ubuntu/python-django | <1:1.11.11-1ubuntu1.21+ | 1:1.11.11-1ubuntu1.21+ |
ubuntu/python-django | <2:2.2.12-1ubuntu0.21 | 2:2.2.12-1ubuntu0.21 |
ubuntu/python-django | <2:3.2.12-2ubuntu1.10 | 2:3.2.12-2ubuntu1.10 |
ubuntu/python-django | <3:4.2.4-1ubuntu2.1 | 3:4.2.4-1ubuntu2.1 |
ubuntu/python-django | <4.2.10<3.2.24 | 4.2.10 3.2.24 |
Djangoproject Django | >=3.2<3.2.24 | |
Djangoproject Django | >=4.2<4.2.10 | |
Djangoproject Django | >=5.0<5.0.2 | |
redhat/django | <3.2.24 | 3.2.24 |
redhat/django | <4.2.10 | 4.2.10 |
redhat/django | <5.0.2 | 5.0.2 |
pip/Django | >=3.2<3.2.24 | 3.2.24 |
pip/django | >=5.0<5.0.2 | 5.0.2 |
pip/django | >=4.2<4.2.10 | 4.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.