Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.
References
Configurations
Configuration 1 (hide)
|
History
19 Sep 2024, 16:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Wagtail wagtail
Wagtail |
|
CPE | cpe:2.3:a:wagtail:wagtail:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
References | () https://github.com/wagtail/wagtail/commit/31b1e8532dfb1b70d8d37d22aff9cbde9109cdf2 - Patch | |
References | () https://github.com/wagtail/wagtail/commit/3c941136f79c48446e3858df46e5b668d7f83797 - Patch | |
References | () https://github.com/wagtail/wagtail/commit/b783c096b6d4fd2cfc05f9137a0be288850e99a2 - Patch | |
References | () https://github.com/wagtail/wagtail/security/advisories/GHSA-jmp3-39vp-fwg8 - Third Party Advisory |
11 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-11 16:15
Updated : 2024-09-19 16:08
NVD link : CVE-2024-39317
Mitre link : CVE-2024-39317
CVE.ORG link : CVE-2024-39317
JSON object : View
Products Affected
wagtail
- wagtail
CWE
CWE-1333
Inefficient Regular Expression Complexity