Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Wagtail
Wagtail wagtail
CPEs cpe:2.3:a:wagtail:wagtail:*:*:*:*:*:*:*:*
Vendors & Products Wagtail
Wagtail wagtail

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T04:19:20.749Z

Reserved: 2024-06-21T18:15:22.262Z

Link: CVE-2024-39317

cve-icon Vulnrichment

Updated: 2024-07-18T15:20:28.844Z

cve-icon NVD

Status : Modified

Published: 2024-07-11T16:15:02.477

Modified: 2024-11-21T09:27:26.850

Link: CVE-2024-39317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.