CVE-2024-41990: Django vulnerable to a denial-of-service attack
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-795c-9xpc-xw6g
- github.com/django/django
- github.com/django/django/commit/7b7b909579c8311c140c89b8a9431bf537febf93
- github.com/django/django/commit/d0a82e26a74940bf0c78204933c3bdd6a283eb88
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-68.yaml
- nvd.nist.gov/vuln/detail/CVE-2024-41990
- www.djangoproject.com/weblog/2024/aug/06/security-releases
Detect and mitigate CVE-2024-41990 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →