Skip to main content

CVE-2024-24680: n/a in n/a

High
VulnerabilityCVE-2024-24680cvecve-2024-24680
Published: Tue Feb 06 2024 (02/06/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:25:38 UTC

Technical Analysis

CVE-2024-24680 is a denial-of-service (DoS) vulnerability affecting the Django web framework versions prior to 3.2.24, 4.2.10, and 5.0.2. The vulnerability specifically involves the intcomma template filter, which is used to format numbers by inserting commas at the appropriate places (e.g., 1,000,000). When this filter processes very long strings, it can be exploited to cause excessive resource consumption, leading to a denial-of-service condition. The vulnerability is exploitable remotely without authentication or user interaction, as the intcomma filter is typically applied to user-controllable input rendered in templates. The CVSS 3.1 base score is 7.5 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). Although no known exploits are currently reported in the wild, the ease of exploitation and the potential for service disruption make this a significant concern for Django-based web applications. Organizations using affected Django versions should prioritize patching to mitigate the risk of service outages caused by maliciously crafted input strings that trigger the vulnerability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to web services and applications built on the affected Django versions. A successful DoS attack could disrupt availability of critical web portals, e-commerce platforms, and internal applications, leading to operational downtime, loss of customer trust, and potential financial losses. Sectors such as finance, healthcare, government, and e-commerce, which often rely on Django for rapid web development, could be particularly impacted. Given the remote exploitability and lack of authentication requirements, attackers can launch DoS attacks from anywhere, potentially targeting European organizations with high visibility or strategic importance. Additionally, disruption of public-facing services could have cascading effects on supply chains and citizen services, especially in countries with high digital service adoption.

Mitigation Recommendations

European organizations should immediately upgrade Django installations to versions 3.2.24, 4.2.10, or 5.0.2 or later, where the vulnerability is patched. Until upgrades are applied, organizations can implement input validation and length restrictions on user-supplied data that is processed by the intcomma filter to limit the size of strings passed to templates. Web application firewalls (WAFs) can be configured to detect and block unusually long numeric strings or suspicious payloads targeting template filters. Monitoring application logs for abnormal template rendering times or resource usage spikes can help detect exploitation attempts early. Additionally, organizations should review their deployment of Django template filters and consider disabling or replacing the intcomma filter in contexts where untrusted input is processed. Regular security testing and code reviews focusing on template rendering logic will further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec38d

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:25:38 AM

Last updated: 8/15/2025, 10:47:37 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats