CVE-2024-56374
Description
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
CWE
- CWE-770 — CWE-770 Allocation of Resources Without Limits or Throttling
Affected
- djangoproject / Django — v=4.2 <4.2.18 [affected]; v=5.0 <5.0.11 [affected]; v=5.1 <5.1.5 [affected]
CVSS
- 3.1 score=5.8 severity=MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
References
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/jan/14/security-releases/
Source
cvelistV5-main/cves/2024/56xxx/CVE-2024-56374.json