Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 19 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Wagtail Wagtail wagtail | |
| CPEs | cpe:2.3:a:wagtail:wagtail:*:*:*:*:*:*:*:* | |
| Vendors & Products | Wagtail Wagtail wagtail | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-11T15:23:22.307Z
Updated: 2024-08-02T04:19:20.749Z
Reserved: 2024-06-21T18:15:22.262Z
Link: CVE-2024-39317
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-07-18T15:20:28.844Z
 NVD
                        NVD
                    Status : Modified
Published: 2024-07-11T16:15:02.477
Modified: 2024-11-21T09:27:26.850
Link: CVE-2024-39317
 Redhat
                        Redhat
                    No data.