First published: Tue Jan 30 2024(Updated: )
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-django | <=1:1.11.29-1~deb10u1<=1:1.11.29-1+deb10u11<=2:2.2.28-1~deb11u2<=3:3.2.19-1+deb12u1 | 3:4.2.11-1 |
ubuntu/python-django | <1:1.11.11-1ubuntu1.21+ | 1:1.11.11-1ubuntu1.21+ |
ubuntu/python-django | <2:2.2.12-1ubuntu0.21 | 2:2.2.12-1ubuntu0.21 |
ubuntu/python-django | <2:3.2.12-2ubuntu1.10 | 2:3.2.12-2ubuntu1.10 |
ubuntu/python-django | <3:4.2.4-1ubuntu2.1 | 3:4.2.4-1ubuntu2.1 |
ubuntu/python-django | <4.2.10<3.2.24 | 4.2.10 3.2.24 |
Djangoproject Django | >=3.2<3.2.24 | |
Djangoproject Django | >=4.2<4.2.10 | |
Djangoproject Django | >=5.0<5.0.2 | |
redhat/django | <3.2.24 | 3.2.24 |
redhat/django | <4.2.10 | 4.2.10 |
redhat/django | <5.0.2 | 5.0.2 |
pip/Django | >=3.2<3.2.24 | 3.2.24 |
pip/django | >=5.0<5.0.2 | 5.0.2 |
pip/django | >=4.2<4.2.10 | 4.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24680 is classified as a potential denial-of-service vulnerability in Django.
To remediate CVE-2024-24680, upgrade Django to versions 3.2.24, 4.2.10, or 5.0.2 or later.
The affected versions include Django 3.2 before 3.2.24, 4.2 before 4.2.10, and 5.0 before 5.0.2.
Yes, you can upgrade Django using pip to version 3.2.24, 4.2.10, or 5.0.2 to address CVE-2024-24680.
CVE-2024-24680 may allow an attacker to cause a denial-of-service condition through the intcomma template filter.