{"id":"CVE-2024-45230","details":"An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.","aliases":["BIT-django-2024-45230","GHSA-5hgc-2vfp-mqvc","PYSEC-2024-102"],"modified":"2026-03-12T02:17:42.508308774Z","published":"2024-10-08T16:15:11.903Z","related":["MGASA-2025-0039","SUSE-SU-2024:3139-1","SUSE-SU-2024:3161-1","SUSE-SU-2024:3187-1","openSUSE-SU-2024:0282-1","openSUSE-SU-2024:14310-1","openSUSE-SU-2024:14318-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"ADVISORY","url":"https://docs.djangoproject.com/en/dev/releases/security/"},{"type":"ADVISORY","url":"https://www.djangoproject.com/weblog/2024/sep/03/security-releases/"},{"type":"REPORT","url":"https://groups.google.com/forum/#%21forum/django-announce"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"0"},{"fixed":"6f9fea33137fee6416ff43b775aa9567440a23d3"},{"introduced":"52821001bb62b764d73e63812133f199b8fef9eb"},{"fixed":"8e68f938f376cf2ca22a7e8ff0bcbe1b7a5832d1"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45230.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}