CVE-2024-24680: Django denial-of-service attack in the intcomma template filter
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
References
- docs.djangoproject.com/en/5.0/releases/security/
- github.com/advisories/GHSA-xxj9-f6rv-m3x4
- github.com/django/django/commit/16a8fe18a3b81250f4fa57e3f93f0599dc4895bc
- github.com/django/django/commit/55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9
- github.com/django/django/commit/572ea07e84b38ea8de0551f4b4eda685d91d09d2
- github.com/django/django/commit/c1171ffbd570db90ca206c30f8e2b9f691243820
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-28.yaml
- groups.google.com/forum/
- nvd.nist.gov/vuln/detail/CVE-2024-24680
- www.djangoproject.com/weblog/2024/feb/06/security-releases/
Detect and mitigate CVE-2024-24680 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →