6.5
CVSSv3

CVE-2020-15225

Published: 29/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

django-filter is a generic system for filtering Django QuerySets based on user selections. In django-filter before version 2.4.0, automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances. In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

django-filter project django-filter

fedoraproject fedora 34

fedoraproject fedora 35

Github Repositories

DjangoFilter_DoS_POC Description PoC of CVE-2020-15225 (DoS vulnerability in Django Filter library < 240) githubcom/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973 cvemitreorg/cgi-bin/cvenamecgi?name=2020-15225 Dependencies installation: python3 -m pip install -r requirementstxt Execution: python3 managepy runserver