CVE-2024-56374

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
mitreCNA
5.8 MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 20%
Debian logo
Debian Releases
Debian Product
Codename
python-django
bullseye
vulnerable
bullseye (security)
2:2.2.28-1~deb11u6
fixed
bookworm
vulnerable
bookworm (security)
vulnerable
sid
3:4.2.21-1
fixed
trixie
3:4.2.21-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-django
plucky
Fixed 3:4.2.18-1
released
oracular
Fixed 3:4.2.15-1ubuntu1.2
released
noble
Fixed 3:4.2.11-1ubuntu1.5
released
jammy
Fixed 2:3.2.12-2ubuntu1.16
released
focal
Fixed 2:2.2.12-1ubuntu0.27
released
bionic
Fixed 1:1.11.11-1ubuntu1.21+esm9
released
xenial
needs-triage
trusty
needs-triage