An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
References
Configurations
History
18 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.djangoproject.com/en/4.1/releases/security/ - Patch, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/02/14/1 - Mailing List, Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://www.djangoproject.com/weblog/2023/feb/14/security-releases/ - Patch, Release Notes, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230316-0006/ - |
07 Nov 2023, 04:08
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
28 Apr 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Apr 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-02-15 01:15
Updated : 2025-03-18 20:15
NVD link : CVE-2023-24580
Mitre link : CVE-2023-24580
JSON object : View
Products Affected
debian
- debian_linux
djangoproject
- django
CWE
CWE-400
Uncontrolled Resource Consumption