{"id":"CVE-2023-24580","details":"An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.","aliases":["BIT-django-2023-24580","GHSA-2hrw-hx67-34x6","PYSEC-2023-13"],"modified":"2026-03-20T11:47:49.234563Z","published":"2023-02-15T01:15:10.687Z","related":["MGASA-2023-0165","SUSE-SU-2023:0704-1","SUSE-SU-2023:2080-1","openSUSE-SU-2023:0062-1","openSUSE-SU-2023:0075-1","openSUSE-SU-2023:0077-1","openSUSE-SU-2023:0178-1","openSUSE-SU-2024:12690-1","openSUSE-SU-2024:14208-1","openSUSE-SU-2025:14662-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/"},{"type":"WEB","url":"https://groups.google.com/forum/#%21forum/django-announce"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230316-0006/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/02/14/1"},{"type":"FIX","url":"https://docs.djangoproject.com/en/4.1/releases/security/"},{"type":"FIX","url":"https://www.djangoproject.com/weblog/2023/feb/14/security-releases/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"3591e1c1acbd7c13174275367c3fdf012cb0413b"},{"fixed":"722e9f8a38f5b34f2423059a75f8a59bb8eb931a"},{"introduced":"ef62a3a68c9d558486145a42c0d71ea9a76add9e"},{"fixed":"4d51383f09870e3dade9967a60c956fb81b874a7"},{"introduced":"9fee86e44dd83dc968ec443adcde191b3eba1286"},{"fixed":"c57ff9ba5e251cd4c2761105a6046662c08f951e"}],"database_specific":{"versions":[{"introduced":"3.2"},{"fixed":"3.2.18"},{"introduced":"4.0"},{"fixed":"4.0.10"},{"introduced":"4.1"},{"fixed":"4.1.7"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-24580.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}