First published: Tue Jan 14 2025(Updated: )
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions `clean_ipv6_address` and `is_valid_ipv6_address` are vulnerable, as is the `django.forms.GenericIPAddressField` form field. (The django.db.models.GenericIPAddressField model field is not affected.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=4.2<4.2.18 | 4.2.18 |
pip/Django | >=5.0<5.0.11 | 5.0.11 |
pip/Django | >=5.1<5.1.5 | 5.1.5 |
debian/python-django | <=2:2.2.28-1~deb11u2<=2:2.2.28-1~deb11u4<=3:3.2.19-1+deb12u1 | 3:4.2.18-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.