First published: Fri Jul 05 2024(Updated: )
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=5.0<5.0.7 | 5.0.7 |
pip/Django | >=4.2<4.2.14 | 4.2.14 |
debian/python-django | <=2:2.2.28-1~deb11u2<=3:3.2.19-1+deb12u1 | 3:4.2.16-1 |
IBM Storage Defender Resiliency Service | <=2.0.0 - 2.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38875 has a severity that indicates a potential denial of service risk in affected versions of Django.
To fix CVE-2024-38875, upgrade to Django version 4.2.14 or 5.0.7 or later.
CVE-2024-38875 affects Django versions prior to 4.2.14 and 5.0 before 5.0.7.
CVE-2024-38875 may enable denial of service attacks through improper handling of inputs with numerous brackets.
Users of Django are advised to update their installations to the patched versions to mitigate the risks posed by CVE-2024-38875.