Search for vulnerabilities
Vulnerability details: VCID-ssr4-dq86-aaak
Vulnerability ID VCID-ssr4-dq86-aaak
Aliases BIT-django-2024-39614
CVE-2024-39614
GHSA-f6f8-9mx6-9mx2
PYSEC-2024-59
Summary An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39614.json
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02585 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02585 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02794 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02794 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02794 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02794 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02794 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02989 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02989 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.02989 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.03264 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05412 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05833 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05833 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05833 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05833 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.05833 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.10061 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.10061 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.10061 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.17543 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.17543 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.17543 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.17543 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.21711 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.21711 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.21711 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.21711 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
epss 0.6755 https://api.first.org/data/v1/epss?cve=CVE-2024-39614
cvssv3.1 3.7 https://docs.djangoproject.com/en/dev/releases/security
generic_textual MODERATE https://docs.djangoproject.com/en/dev/releases/security
generic_textual Medium https://docs.djangoproject.com/en/dev/releases/security/
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-f6f8-9mx6-9mx2
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.5 https://github.com/django/django/commit/17358fb35fb7217423d4c4877ccb6d1a3a40b1c3
generic_textual HIGH https://github.com/django/django/commit/17358fb35fb7217423d4c4877ccb6d1a3a40b1c3
cvssv3.1 7.5 https://github.com/django/django/commit/8e7a44e4bec0f11474699c3111a5e0a45afe7f49
generic_textual HIGH https://github.com/django/django/commit/8e7a44e4bec0f11474699c3111a5e0a45afe7f49
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-59.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-59.yaml
cvssv3.1 3.7 https://groups.google.com/forum/#%21forum/django-announce
generic_textual MODERATE https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2024/jul/09/security-releases
generic_textual HIGH https://www.djangoproject.com/weblog/2024/jul/09/security-releases
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39614.json
https://api.first.org/data/v1/epss?cve=CVE-2024-39614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39614
https://docs.djangoproject.com/en/dev/releases/security
https://docs.djangoproject.com/en/dev/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/17358fb35fb7217423d4c4877ccb6d1a3a40b1c3
https://github.com/django/django/commit/8e7a44e4bec0f11474699c3111a5e0a45afe7f49
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-59.yaml
https://groups.google.com/forum/#%21forum/django-announce
https://www.djangoproject.com/weblog/2024/jul/09/security-releases
https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
1076069 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076069
2295938 https://bugzilla.redhat.com/show_bug.cgi?id=2295938
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
CVE-2024-39614 https://nvd.nist.gov/vuln/detail/CVE-2024-39614
GHSA-f6f8-9mx6-9mx2 https://github.com/advisories/GHSA-f6f8-9mx6-9mx2
RHSA-2024:8906 https://access.redhat.com/errata/RHSA-2024:8906
RHSA-2024:9481 https://access.redhat.com/errata/RHSA-2024:9481
RHSA-2025:1335 https://access.redhat.com/errata/RHSA-2025:1335
USN-6888-1 https://usn.ubuntu.com/6888-1/
USN-6888-2 https://usn.ubuntu.com/6888-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39614.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://docs.djangoproject.com/en/dev/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/17358fb35fb7217423d4c4877ccb6d1a3a40b1c3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/8e7a44e4bec0f11474699c3111a5e0a45afe7f49
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-59.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2024/jul/09/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.16666
EPSS Score 0.00045
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-07-09T23:19:42.926579+00:00 SUSE Severity Score Importer Import https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml 34.0.0rc4