Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-56374

Опубликовано: 14 янв. 2025
Источник: redhat
CVSS3: 5.8

Описание

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)

A flaw was found in the Django framework. Lack of upper bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial of service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address were vulnerable, as was the django.forms.GenericIPAddressField form field, which has now been updated to define a max_length of 39 characters.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 1.2ansible-towerNot affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-dellemc-openmanage-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/platform-resource-runner-rhel8Not affected
Red Hat Ansible Automation Platform 2ee-dellemc-openmanage-rhel8Not affected
Red Hat Ansible Automation Platform 2python-djangoAffected
Red Hat Certification for Red Hat Enterprise Linux 7python-djangoNot affected
Red Hat OpenStack Platform 16.2python-django20Not affected
Red Hat OpenStack Platform 17.1python-djangoNot affected
Red Hat OpenStack Platform 18.0python-djangoNot affected
Red Hat Storage 3python-djangoNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2337996django: potential denial-of-service vulnerability in IPv6 validation

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
ubuntu
около 1 года назад

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)

CVSS3: 5.8
nvd
около 1 года назад

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)

CVSS3: 5.8
debian
около 1 года назад

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, ...

suse-cvrf
около 1 года назад

Security update for python-Django

CVSS3: 5.8
github
около 1 года назад

Django has a potential denial-of-service vulnerability in IPv6 validation

5.8 Medium

CVSS3