Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-39317— Wagtail regular expression denial-of-service via search query parsing

CVSS 6.5 · Medium EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-39317

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Wagtail regular expression denial-of-service via search query parsing
Source: NVD (National Vulnerability Database)
Vulnerability Description
Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1333
Source: NVD (National Vulnerability Database)
Vulnerability Title
Torchbox Wagtail 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Torchbox Wagtail是英国Torchbox公司的一套开源的内容管理系统(CMS)。 Torchbox Wagtail 5.2.6、6.0至6.0.5和6.1至6.1.2版本存在安全漏洞,该漏洞源于parse_query_string中存在一个错误,导致它需要很长时间来处理适当制作的输入,可能导致拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
wagtailwagtail >= 2.0, < 5.2.6 -

II. Public POCs for CVE-2024-39317

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-39317

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-39317

No comments yet


Leave a comment