{"id":"CVE-2024-41990","details":"An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.","aliases":["BIT-django-2024-41990","GHSA-795c-9xpc-xw6g","PYSEC-2024-68"],"modified":"2026-04-16T04:35:45.112066754Z","published":"2024-08-07T15:15:56.100Z","related":["SUSE-SU-2024:2816-1","SUSE-SU-2024:2817-1","SUSE-SU-2024:2861-1","openSUSE-SU-2024:0272-1","openSUSE-SU-2024:14247-1","openSUSE-SU-2024:14248-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"WEB","url":"https://groups.google.com/forum/#%21forum/django-announce"},{"type":"ADVISORY","url":"https://www.djangoproject.com/weblog/2024/aug/06/security-releases/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240905-0007/"},{"type":"FIX","url":"https://docs.djangoproject.com/en/dev/releases/security/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"879e5d587b84e6fc961829611999431778eb9f6a"},{"fixed":"4d32ebcd57340aa8de2d6d31613f1646dc6391f6"},{"introduced":"52821001bb62b764d73e63812133f199b8fef9eb"},{"fixed":"84d1102a8a3bba64bcc1b14a7117c26a83fb7fe5"}],"database_specific":{"versions":[{"introduced":"4.2"},{"fixed":"4.2.15"},{"introduced":"5.0"},{"fixed":"5.0.8"}]}}],"versions":["4.2","4.2.1","4.2.10","4.2.11","4.2.12","4.2.13","4.2.14","4.2.2","4.2.3","4.2.4","4.2.5","4.2.6","4.2.7","4.2.8","4.2.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41990.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}