- Description
- An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- nvd@nist.gov
- NVD-CWE-noinfo
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-130
- Hype score
- Not currently trending
Interesting parsing issue in Django "urlize" and "urlizetrunc" template filters that led to DoS with a large number of ".;" characters (CVE-2024-41990) Bounty: $2,162 https://t.co/XzAB1aPZIN #bugbountytips #bugbounty #cybersecurity https://t.co/V16hc1l11Z
@payloadartist
1 Dec 2024
970 Impressions
4 Retweets
13 Likes
5 Bookmarks
0 Replies
0 Quotes
CVE-2024-41990: Potential denial-of-service in django.utils.html.urlize() https://t.co/fuTWu2ETsS #bugbounty #bugbountytips #bugbountytip
@bountywriteups
30 Nov 2024
617 Impressions
1 Retweet
6 Likes
1 Bookmark
0 Replies
0 Quotes
⚡ CVE-2024-41990: Potential denial-of-service in django.utils.html.urlize() 👨🏻💻 mprogrammer ➟ Internet Bug Bounty 🟧 Medium 💰 $2,162 🔗 https://t.co/C6t1nAJFRh #bugbounty #bugbountytips #cybersecurity #infosec https://t.co/n1MswnXkoX
@h1Disclosed
30 Nov 2024
1009 Impressions
2 Retweets
26 Likes
5 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7C38224F-C41B-428C-89C2-603BBA95AD3C",
"versionEndExcluding": "4.2.15",
"versionStartIncluding": "4.2"
},
{
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3384B57C-DBF5-4E23-99E7-92B260D53E8E",
"versionEndExcluding": "5.0.8",
"versionStartIncluding": "5.0"
}
],
"operator": "OR"
}
]
}
]