An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3329-1 | python-django security update |
Debian DSA |
DSA-5465-1 | python-django security update |
Github GHSA |
GHSA-2hrw-hx67-34x6 | Resource exhaustion in Django |
Ubuntu USN |
USN-5868-1 | Django vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-18T19:24:32.509Z
Reserved: 2023-01-27T00:00:00.000Z
Link: CVE-2023-24580
Updated: 2024-08-02T11:03:18.895Z
Status : Modified
Published: 2023-02-15T01:15:10.687
Modified: 2025-03-18T20:15:18.837
Link: CVE-2023-24580
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN