cve/2024/CVE-2024-56374.md

18 lines
926 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-56374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56374)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/zhanpengliu-tencent/medium-cve