An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat ansible Automation Platform Redhat discovery |
|
CPEs | cpe:/a:redhat:ansible_automation_platform:2.4::el8 cpe:/a:redhat:ansible_automation_platform:2.5::el8 cpe:/a:redhat:ansible_automation_platform:2.5::el9 cpe:/o:redhat:discovery:1::el9 |
|
Vendors & Products |
Redhat
Redhat ansible Automation Platform Redhat discovery |
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 23 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 15 Jan 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | django: potential denial-of-service vulnerability in IPv6 validation | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 14 Jan 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 14 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.) | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-12T20:31:20.698Z
Reserved: 2024-12-22T00:00:00.000Z
Link: CVE-2024-56374

Updated: 2025-01-23T18:03:28.376Z

Status : Awaiting Analysis
Published: 2025-01-14T19:15:32.510
Modified: 2025-01-23T18:15:32.820
Link: CVE-2024-56374
