CVE-2024-39317

CVSS V2 None CVSS V3 None
Description
Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.
Overview
  • CVE ID
  • CVE-2024-39317
  • Assigner
  • GitHub_M
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2024-07-11T15:23:22.307Z
  • Last Modified Date
  • 2024-07-11T15:23:22.307Z
History
Created Old Value New Value Data Type Notes
2024-07-12 13:07:26 Added to TrackCVE