CVE-2024-45230

Name
CVE-2024-45230
Description
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://docs.djangoproject.com/en/dev/releases/security/
https://groups.google.com/forum/#%21forum/django-announce
https://www.djangoproject.com/weblog/2024/sep/03/security-releases/

Match rules

CPE URI Source package Min version Max version
n/a == n/a == n/a
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* django >= 4.2.0 < 4.2.16
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* django >= 5.0 < 5.0.9
cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:* django == None == 5.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
py3-django edge-community 4.2.16-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
py3-django 3.20-community 4.2.16-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
py3-django 3.21-community 4.2.16-r0 Natanael Copa <ncopa@alpinelinux.org> fixed