Description
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
Published: 2023-02-15
Score: 7.5 High
EPSS: 25.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3329-1 python-django security update
Debian DSA Debian DSA DSA-5465-1 python-django security update
Github GHSA Github GHSA GHSA-2hrw-hx67-34x6 Resource exhaustion in Django
Ubuntu USN Ubuntu USN USN-5868-1 Django vulnerability
History

Tue, 18 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Debian Debian Linux
Djangoproject Django
Redhat Ansible Automation Platform Rhui Satellite Satellite Capsule
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-18T19:24:32.509Z

Reserved: 2023-01-27T00:00:00.000Z

Link: CVE-2023-24580

cve-icon Vulnrichment

Updated: 2024-08-02T11:03:18.895Z

cve-icon NVD

Status : Modified

Published: 2023-02-15T01:15:10.687

Modified: 2025-03-18T20:15:18.837

Link: CVE-2023-24580

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-02-14T09:00:00Z

Links: CVE-2023-24580 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses