CVE-2024-28865

django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a regular expression loop. Version 0.10.1 fixes this issue. As a workaround, close off access to create and edit articles by anonymous users.
Configurations

No configuration.

History

21 Nov 2024, 09:07

Type Values Removed Values Added
References () https://github.com/django-wiki/django-wiki/commit/8e280fd6c0bd27ce847c67b2d216c6cbf920f88c - () https://github.com/django-wiki/django-wiki/commit/8e280fd6c0bd27ce847c67b2d216c6cbf920f88c -
References () https://github.com/django-wiki/django-wiki/security/advisories/GHSA-wj85-w4f4-xh8h - () https://github.com/django-wiki/django-wiki/security/advisories/GHSA-wj85-w4f4-xh8h -

19 Mar 2024, 13:26

Type Values Removed Values Added
Summary
  • (es) django-wiki es un sistema wiki para Django. Las instalaciones de django-wiki anteriores a la versión 0.10.1 son vulnerables al contenido de artículos creados con fines malintencionados que pueden causar un uso severo de la CPU del servidor a través de un bucle de expresión regular. La versión 0.10.1 soluciona este problema. Como workaround, cierre el acceso para crear y editar artículos a usuarios anónimos.

18 Mar 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 22:15

Updated : 2024-11-21 09:07


NVD link : CVE-2024-28865

Mitre link : CVE-2024-28865

CVE.ORG link : CVE-2024-28865


JSON object : View

Products Affected

No product.

CWE
CWE-1333

Inefficient Regular Expression Complexity