CVE-2023-24580

An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/02/14/1 Mailing List Release Notes Third Party Advisory
https://docs.djangoproject.com/en/4.1/releases/security/ Patch Vendor Advisory
https://groups.google.com/forum/#%21forum/django-announce
https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/
https://security.netapp.com/advisory/ntap-20230316-0006/
https://www.djangoproject.com/weblog/2023/feb/14/security-releases/ Patch Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2023/02/14/1 Mailing List Release Notes Third Party Advisory
https://docs.djangoproject.com/en/4.1/releases/security/ Patch Vendor Advisory
https://groups.google.com/forum/#%21forum/django-announce
https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/
https://security.netapp.com/advisory/ntap-20230316-0006/
https://www.djangoproject.com/weblog/2023/feb/14/security-releases/ Patch Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:48

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/02/14/1 - Mailing List, Release Notes, Third Party Advisory () http://www.openwall.com/lists/oss-security/2023/02/14/1 - Mailing List, Release Notes, Third Party Advisory
References () https://docs.djangoproject.com/en/4.1/releases/security/ - Patch, Vendor Advisory () https://docs.djangoproject.com/en/4.1/releases/security/ - Patch, Vendor Advisory
References () https://groups.google.com/forum/#%21forum/django-announce - () https://groups.google.com/forum/#%21forum/django-announce -
References () https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/ -
References () https://security.netapp.com/advisory/ntap-20230316-0006/ - () https://security.netapp.com/advisory/ntap-20230316-0006/ -
References () https://www.djangoproject.com/weblog/2023/feb/14/security-releases/ - Patch, Release Notes, Vendor Advisory () https://www.djangoproject.com/weblog/2023/feb/14/security-releases/ - Patch, Release Notes, Vendor Advisory
Summary
  • (es) Se descubrió un problema en Multipart Request Parser de Django 3.2 anterior a 3.2.18, 4.0 anterior a 4.0.10 y 4.1 anterior a 4.1.7. Pasar ciertas entradas (por ejemplo, una cantidad excesiva de partes) a formularios de varias partes podría generar demasiados archivos abiertos o agotamiento de la memoria, y proporcionaba un vector potencial para un ataque de denegación de servicio.

28 Apr 2023, 05:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/ -

28 Apr 2023, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/ -

16 Mar 2023, 16:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230316-0006/ -

11 Mar 2023, 06:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/ -

23 Feb 2023, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-15 01:15

Updated : 2024-11-21 07:48


NVD link : CVE-2023-24580

Mitre link : CVE-2023-24580

CVE.ORG link : CVE-2023-24580


JSON object : View

Products Affected

djangoproject

  • django

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption