CVE-2024-39317
CVSS V2 None
CVSS V3 None
Description
Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.
Overview
- CVE ID
- CVE-2024-39317
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-11T15:23:22.307Z
- Last Modified Date
- 2024-07-11T15:23:22.307Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/wagtail/wagtail/security/advisories/GHSA-jmp3-39vp-fwg8 | x_refsource_CONFIRM |
https://github.com/wagtail/wagtail/commit/31b1e8532dfb1b70d8d37d22aff9cbde9109cdf2 | x_refsource_MISC |
https://github.com/wagtail/wagtail/commit/3c941136f79c48446e3858df46e5b668d7f83797 | x_refsource_MISC |
https://github.com/wagtail/wagtail/commit/b783c096b6d4fd2cfc05f9137a0be288850e99a2 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-39317 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39317 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-07-12 13:07:26 | Added to TrackCVE |