0
0
mirror of https://github.com/wagtail/wagtail.git synced 2024-11-25 05:02:57 +01:00

Release note for CVE-2024-39317 in 5.2.6

This commit is contained in:
Matt Westcott 2024-07-11 11:09:16 +02:00
parent 8667318326
commit 7c16075342
2 changed files with 10 additions and 0 deletions

View File

@ -401,6 +401,7 @@ Changelog
5.2.6 (xx.xx.xxxx) - IN DEVELOPMENT
~~~~~~~~~~~~~~~~~~
* Fix: CVE-2024-39317: Regular expression denial-of-service via search query parsing (Jake Howard)
* Fix: Fix image preview when Willow optimizers are enabled (Alex Tomkins)
* Maintenance: Remove django-pattern-library upper bound in testing dependencies (Sage Abdullah)

View File

@ -11,6 +11,15 @@ depth: 1
## What's new
### CVE-2024-39317: Regular expression denial-of-service via search query parsing
This release addresses a denial-of-service vulnerability in Wagtail. A bug in Wagtail's [`parse_query_string`](wagtailsearch_query_string_parsing) would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service.
In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses parse_query_string, it may be exploitable by other users (e.g. unauthenticated users).
Many thanks to Jake Howard for reporting and fixing this issue. For further details, please see [the CVE-2024-39317 security advisory](https://github.com/wagtail/wagtail/security/advisories/GHSA-jmp3-39vp-fwg8).
### Bug fixes
* Fix image preview when Willow optimizers are enabled (Alex Tomkins)