CVE-2024-45230: Django vulnerable to denial-of-service attack via the urlize() and urlizetrunc() template filters
(updated )
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-5hgc-2vfp-mqvc
- github.com/django/django
- github.com/django/django/commit/022ab0a75c76ab2ea31dfcc5f2cf5501e378d397
- github.com/django/django/commit/813de2672bd7361e9a453ab62cd6e52f96b6525b
- github.com/django/django/commit/d147a8ebbdf28c17cafbbe2884f0bc57e2bf82e2
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-102.yaml
- groups.google.com/forum/
- nvd.nist.gov/vuln/detail/CVE-2024-45230
- www.djangoproject.com/weblog/2024/sep/03/security-releases
Detect and mitigate CVE-2024-45230 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →