First published: Fri Aug 02 2024(Updated: )
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=4.2<4.2.15 | 4.2.15 |
pip/Django | >=5.0<5.0.8 | 5.0.8 |
Djangoproject Django | >=4.2<4.2.15 | |
Djangoproject Django | >=5.0<5.0.8 | |
debian/python-django | <=2:2.2.28-1~deb11u2<=3:3.2.19-1+deb12u1 | 3:4.2.16-1 |
IBM Storage Defender - Resiliency Service | <=2.0.0 - 2.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41990 has a severity level that indicates it is susceptible to denial-of-service attacks due to processing large inputs.
To fix CVE-2024-41990, upgrade Django to version 5.0.8 or 4.2.15 or later.
Django versions prior to 5.0.8 and 4.2.15 are affected by CVE-2024-41990.
Failing to address CVE-2024-41990 could lead to denial-of-service vulnerabilities which may disrupt application availability.
Yes, CVE-2024-41990 specifically affects the urlize() and urlizetrunc() template filters in Django.